Forum Discussion
EDR in block mode - specific devices & false positives
- Feb 26, 2024
You should create a Windows Custom Policy (OMA-URI) - in Intune go to Windows Configuration Profiles > pick Template Custom >Add OMA URI Settings > OMA-URI should be: ./Device/Vendor/MSFT/Defender/Configuration/PassiveRemediation the data type integer and value I picked is 4 (4 stand for: Passive Remediation Realtime Protection Remediation, again see this link defender-csp ). See attached screenshot for the Configuration. After this you need to assign it to the device.
Regarding False positives you should first run the solution in audit mode and filter out the known false positives using the Defender Admin Portal before going to production. The OMA-URI integer value should be 2 for audit mode. After you encounter false positives in the audit phase or in the production remediation phase, follow this guide: https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/defender-endpoint-false-positives-negatives?view=o365-worldwide There is a section about un-doing remediation actions. You can perform those steps from the Defender Admin Portal, it is all well explained in the above guide.
https://learn.microsoft.com/en-us/troubleshoot/mem/intune/device-configuration/deploy-oma-uris-to-target-csp-via-intune#the-windows-event-log
- AB21805Feb 27, 2024Bronze ContributorThe error in event viewer states HexIn1: 0x86000002
in intune the error is -2016281112
Any ideas?- SebastiaanSmitsFeb 27, 2024Steel ContributorThat eventvwr error in this context states: The specified node doesn’t exist.
Can you please verify the requirements for turning on EDR block mode are in place: https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/edr-in-block-mode?view=o365-worldwide#requirements-for-edr-in-block-mode , is this device for example already onboarded? Are the Engines updated? etc.