Recent Discussions
ASR rules enabled after onboarding Windows server
Hello, I tested onboarding Windows Server 2019 to Defender using local script and noticed that after onboarding some ASR rules are already enabled in Block mode by default: Block Office applications from creating executable content 3b576869-a4ec-4529-8536-b80a7769e899 Block execution of potentially obfuscated scripts 5beb7efe-fd9a-4556-801d-275e5ffc04cc Block Office applications from injecting code into other processes 75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 Block Win32 API calls from Office macros 92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b Block credential stealing from the Windows local security authority subsystem (lsass.exe) 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 Block executable content from email client and webmail be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 Block JavaScript or VBScript from launching downloaded executable content d3e037e1-3eb8-44c8-a917-57927947596d Block all Office applications from creating child processes d4f940ab-401b-4efc-aadc-ad5f3c50688a I haven't applied any group policies yet to it. The server is domain joined. Could it happen that it pulls the configuration from another place? ThanksSolved57Views0likes2CommentsCan't update Defender app on macOS
Hello, We started getting this situation where Defender for macOS can't be updated: Microsoft Defender 101.25072 Current Version: 101.25062 Installed: 2025-08-05 Update error: The update could not be installed at this time. Please try again later. Microsoft AutoUpdate is up to date. Operating System Version: 15.6.1 Device managed by Mosyle MDM. All of our active users have been updated to 15.6.1 (and this problem was observed on OS versions from 15.1 to 15.6.1) What could be causing this? And what can we do about it?Solved2.1KViews5likes7CommentsEndpoint settings missing in Microsoft Defender for Endpoint
Hi, I am currently using the Microsoft 365 Developer program and is trying to setup an Intune and Microsoft defender for endpoint tenant however when i am trying to integrate Defender with Intune, the endpoint setting is not showing in the settings despite that i have the Security administrator role. Is this expected when using the developer program or am i missing something? Would appreciate your kind advise.Solved97Views0likes1CommentMS Defender - Installation Error version 101.25072 on macOS
Dear experts, The latest version of MS Defender can't be installed. I'm getting an error message since release date (5th Aug). I have tested to restart the computer, tested with different networks, same issue 🙁Solved4.4KViews6likes22CommentsWhat does "deprecated" mean in the Defender Antivirus for Linux settings?
When you create a Microsoft Defender Antivirus policy for Linux in the Endpoint Security Policies blade of the Defender admin center, there are two settings in the Antivirus Engine section that have "(deprecated)" after them: "Enable real-time protection (deprecated)" and "Enable passive mode (deprecated)": What exactly does "deprecated" mean in this context? I can't imagine that the features themselves are deprecated; are we supposed to be configuring them elsewhere?Solved140Views0likes2CommentsGet-MpPerformanceReport empty processpath
Hi, anyone knows why we sometimes get empty processpath when using Get-MpPerformanceReport to get top processes? Some say it could be Defender for Endpoint, but I would like to be sure what it is. Any ideas on how to get more info? Thank you in advance and don't hesitate if you have any questionsSolved78Views0likes1CommentDefender detection caused by monitoring script
Dear Community We use PRGT, which monitors various things for our customers. One of our customers uses Microsoft Defender, which issued an alert for “SmokeLoader.” After some research, we found that this is caused by two of our scripts, which establish a connection to our servers and query various things. This raised the question of how we can best whitelist this, since the detection comes from “WinRM” and not directly from the script itself. However, the script itself establishes a connection to the servers and requests some information. Are there any sensible measures that can be taken here, because only whitelisting the script (folder or hash) makes limited sense here, since the detection in this case was for the WinRM process. So the behavior analysis would kick in again. Thank you for your time! Best regards, SleeperHeadSolved94Views0likes1CommentWhen is a device considered deleted or inactive in the DeviceInfo table?
Hi, I’m trying to better understand how device lifecycle is handled within Microsoft Defender for Endpoint, specifically in the context of Advanced Hunting via the DeviceInfo table. When can we consider a device as deleted or removed from the DeviceInfo table? How long do offboarded or inactive devices remain in the DeviceInfo table before they are automatically purged? Are there specific values (e.g., onboardingStatus, lastSeen, isActive, etc.) or time-based thresholds that should be used to determine if a device is no longer active? Any guidance or documentation references would be greatly appreciated!Solved102Views0likes1CommentHow to Automatically Export Microsoft Defender Security Recommendations with Historical Tracking
Hi everyone, I'm currently using Microsoft Defender for Endpoint, and I'm looking for a way to automate the export of security recommendations. Right now, the only available option is to manually export these recommendations as a CSV using the "Export" button in the portal. However, I’d like to: Automatically pull these recommendations regularly Store them in an Azure SQL database/Azure Storage Use Power BI to create dashboards and track trends over time (since Defender does not provide historical views) Is there a way to fetch this data programmatically? My Goal: Automatically query this API daily (via Azure Function or Azure Automation or any other way) Store each day's results in an Azure SQL table/Storage account with timestamps Build Power BI reports for: Most frequent vulnerabilities Exposure trends over time Recommendation coverage and progressSolved234Views0likes2CommentsASR rule blocking execution of OneDriveSetup.exe
A member of our Service Desk team was working with a user to troubleshoot an issue with the OneDrive sync client on their Windows workstation. As part of their troubleshooting, they uninstalled the client with the intent to re-install it, but when they attempted to run OneDriveSetup.exe, they received an error. It turned out that execution was being blocked by the "Block use of copied or impersonated system tools" Attack Surface Reduction rule. I was able to work around the issue by creating an exception in our Attack Surface Reduction Rules policy, but this situation consumed most of my morning and seriously impacted the productivity of one of our users, so I would like to ensure that it does not happen again. Should I report this as a false positive (per https://learn.microsoft.com/en-us/defender-endpoint/troubleshoot-asr#report-a-false-positive-or-false-negative ), or is this policy somehow working as designed? If it is the latter, what is the correct approach for reinstalling the OneDrive sync client on a machine with this ASR rule applied to it?Solved287Views0likes2Comments- 211Views0likes6Comments
Indicators added for URL with setting 'Audit'. But where can I review those?
Was asked to put a few domains on a watchlist to see how often they're actually requested from endpoints in our organization. Went to Defender, Settings, Endpoints, Indicators, and added the domains there with the action set to 'audit'. I figured I should be able to review something in the Audit logs of Defender itself, but all I see there are the actions I did when adding the URLs to the indicator list. Anyone have any idea where I can review the usage of those websites I've set to audit, so we can determine if it's feasable to shut them down or not?Solved89Views0likes2CommentsCan I use Microsoft Defender for Endpoint for CIS benchmark assessment
Hi Team, I have a customer who wants to do CIS benchmark assessment (CIS Microsoft Windows Server Benchmarks) for On-prem Windows 2022 servers. Can we use Microsoft defender for endpoint to do it? What's the prerequisite? E5 and Arc onboarding? Thank you. Regards, HuayeSolved1.1KViews0likes6CommentsAutomate bulk-import of file with IP-adresses to block
We use SOAR to bulid a block-file containing IP-adresses we want to block. We can place this file on a network share, sftp, or "whereever". Is it possible for us to instruct Defender to read this file automatically, instead of Some User (tm) having to upload it manually in the security center?Solved108Views0likes1CommentUnderstanding Advanced hunting results
Is anyone able to breakdown the source SourceApp values in detail? In particular what is "ms-fluid_component"? I have a Form that a user created but they're not sure how. I run it through Advanced hunter in Microsoft Defender & it returns "SourceApp":"ms-fluid_component". What is this? ThanksSolved107Views0likes3CommentsBlocking in Vulnerability Management triggers full scan in Defender.
Over that last couple of weeks our users have been complaining about their computers being slow as molasses - we observed Defender was running a full scan after every reboot. Reviewing event logs we were eventually able to pin down the root cause - a while back we introduced a Block remediation for a vulnerable version of 7-Zip. It turned out that the driver updates delivered via Dell Command Update are internally using an older version of 7-Zip for the file extraction, and were being blocked every time the driver installation retry attempt occurred (which seems to be at every reboot...) Removing the block remediation in Vulnerability Management resolved the issue. While having our driver updates being blocked is somewhat of a nuisance, the repeated full scans had a severe impact on our productivity. Does it even make sense for Defender to do a full scan for a detected "Enterprise Unwanted Software"? Are there options to tweak this (apparently) default behavior to skip the (full) scan for certain categories?Solved206Views0likes3CommentsFailed to create object ID in Intune for new onboarded device.
We are deploying Defender for Cloud with XDR onboarding. We are implementing Defender policy with Intune enforcement setting, everything is working for 98% of devices as well. But, for some devices like Arc enabled machines, after going through each step and Microsoft troubleshooting documentation. Some devices are not able to create the synthetic object in Intune to receive Defender XDR policies. No solution is provided in the documentation or in MDEclient parser. In the onboarding workflow, the synthetic object is normally created to apply the policy via Intune. But, when a device fails this process, we have no solution even after re-onboarding.Solved184Views0likes2CommentsMDE disable or uninstall
Hello All, We have onboarded devices to MDE in a setup as follows, 1. Onboard devices to Entra as hybrid entra joined devices 2. Sync/Enroll devices to Intune from on-premise SCCM through co-management config. 3. Onboard devices to MDE from Intune through EDR policy. Once the device are onboarded, how can we do the following, 1. Disable DFE on a device (to disable protection while troubleshooting. Can we just stop the services?) 2. Uninstall DFE from a device (offboarding through a script would also remove all the policies applied to the device immediately?) Please guide.Solved5.3KViews0likes4Comments
Events
Recent Blogs
- As of today, October 14, 2025, Microsoft is officially ending support for Windows 10. This means that Windows 10 devices will no longer receive security or feature updates, nor technical support from...Oct 14, 20251.6KViews1like0Comments
- We’re excited to announce a key milestone in Defender’s multi-tenant management journey—Microsoft Defender for Endpoint security policies can now be distributed across multiple tenants from the Defen...Aug 07, 20251.9KViews3likes0Comments
Resources
Tags
No tags to show