Attack surface reduction (ASR) rules identify and prevent typical malware exploits. They control when and how potentially malicious code can run. For example, they can prevent JavaScript or VBScript from launching a downloaded executable, block Win32 API calls from Office macros, and block processes that run from USB drives. Attack surface management card The Attack surface management […]
Category: Microsoft Endpoint
Increase compliance to the Microsoft Defender for Endpoint security baseline
Security baselines ensure that security features are configured according to guidance from both security experts and expert Windows system administrators. When deployed, the Defender for Endpoint security baseline sets Defender for Endpoint security controls to provide optimal protection. To understand security baselines and how they are assigned on Intune using configuration profiles, read this FAQ. Before […]
Address false positives/negatives in Microsoft Defender for Endpoint
In endpoint protection solutions, a false positive is an entity, such as a file or a process, that was detected and identified as malicious, even though the entity isn’t actually a threat. A false negative is an entity that was not detected as a threat, even though it actually is malicious. False positives/negatives can occur […]
Feedback-loop blocking (Microsoft)
Overview Feedback-loop blocking, also referred to as rapid protection, is a component of behavioral blocking and containment capabilities in Microsoft Defender for Endpoint. With feedback-loop blocking, devices across your organization are better protected from attacks. How feedback-loop blocking works When a suspicious behavior or file is detected, such as by Microsoft Defender Antivirus, information about that artifact is sent […]
Client behavioral blocking (Microsoft)
Overview Client behavioral blocking is a component of behavioral blocking and containment capabilities in Defender for Endpoint. As suspicious behaviors are detected on devices (also referred to as clients or endpoints), artifacts (such as files or applications) are blocked, checked, and remediated automatically. Antivirus protection works best when paired with cloud protection. How client behavioral blocking works […]
Behavioral blocking and containment (Microsoft)
Overview Today’s threat landscape is overrun by fileless malware and that lives off the land, highly polymorphic threats that mutate faster than traditional solutions can keep up with, and human-operated attacks that adapt to what adversaries find on compromised devices. Traditional security solutions aren’t sufficient to stop such attacks; you need artificial intelligence (AI) and device learning […]
Device control report (Microsoft)
Microsoft Defender for Endpoint device control protects against data loss, by monitoring and controlling media use by devices in your organization, such as the use of removable storage devices and USB drives. With the device control report, you can view events that relate to media usage, such as: Audit events: Shows the number of audit events […]
Device Control Printer Protection (Microsoft)
Microsoft Defender for Endpoint Device Control Printer Protection blocks people from printing via non-corporate printers or non-approved USB printer. Licensing Before you get started with Printer Protection, you should confirm your Microsoft 365 subscription. To access and use Printer Protection, you must have the following: Microsoft 365 E3 for functionality/policy deployment Microsoft 365 E5 for reporting […]
Microsoft Defender for Endpoint Device Control Device Installation
Microsoft Defender for Endpoint Device Control Removable Storage Access Control enables you to do the following task: Prevent people from installing specific devices. Allow people from installing specific devices but prevent others. Note To find the difference between Device Installation and Removable storage access control, see Microsoft Defender for Endpoint Device Control Removable Storage Protection. TABLE […]
Microsoft Defender for Endpoint Device Control Removable Storage Access Control
Note The Group Policy management of this product is now generally available (4.18.2106): See Tech Community blog: Protect your removable storage and printer with Microsoft Defender for Endpoint Microsoft Defender for Endpoint Device Control Removable Storage Access Control enables you to do the following task: auditing, allowing or preventing the read, write or execute access to […]