Windows Defender SmartScreen - File and Flash Player Blockage Problem

Published Jan 16 2021 02:09 AM 2,942 Views
Microsoft

                          SmartScreen.gif

 

Dear IT pros, 

Today we discuss about Windows Defender SmartScreen features and follow its activities in defending our systems from Web link and Web download attacks. We then, address the problem with false positive blockage by SmartScreen.

 

Windows Defender SmartScreen Features 

SmartScreen habecome a part of Windows 10 OS, it was named as Windows Defender SmartScreen. It is useful to protect not just Edge, Internet Explorer browsers but also other applications such as third-party browsers, Email Client and Apps from malicious Web link attack, malicious Web download threat. Let us have a quick look into SmartScreen functionalities: 

  • Anti-phishing and anti-malware support. Microsoft Defender SmartScreen helps to protect users from sites that are reported to host phishing attacks or attempt to distribute malicious software.  
  • Prevent drive-by attacks. Drive-by attacks are web-based attacks that tend to start on a trusted site, targeting security vulnerabilities in commonly used software. Because drive-by attacks can happen even if the user does not click or download anything on the page, the danger often goes unnoticed.  
  • Reputation-based URL and app protection. Microsoft Defender SmartScreen evaluates a website's URLs to determine if they're known to distribute or host unsafe content. It also provides reputation checks for apps, checking downloaded programs and the digital signature used to sign a file. If a URL, a file, an app, or a certificate has an established reputation, users won't see any warnings. If, however, there's no reputation, the item is marked as a higher risk and presents a warning to the user. 
  • Improved heuristics and diagnostic data. Microsoft Defender SmartScreen is constantly learning and endeavoring to stay up to date, so it can help to protect you against potentially malicious sites and files. 
  • Blocking URLs associated with potentially unwanted applications. software that can cause your machine to run slowly, display unexpected ads, or at worst, install other software 
  • Configure SmartScreen by GPO. You could enable SmartScreen for all devices by group policy. There are separated policies for IE, Edge and Explorer.
  • Configure SmartScreen by Windows Security App. You could enable SmartScreen to act on Files, Apps and Edge browser of a device by Windows Security Center as shown here: 

ss1.jpg

       Those tests did not contain any harmful file but only virus simulation files and would be harmless.

Your testing device configured with SmartScreen should be able to prevent the users' accesses to phishing web page, malware web page, advertise web page, exploit-browser-vulnerability web page and block the download of malicious apps, potentially unwanted apps (PUA), known malware files.

ss4.jpg

SmartScreen should also be able to give warning of unknown apps and suspicious phishing web page.

An example of suspicious phishing site warned by SmartScreen:

ss6.jpg

Examples of downloads blocked by SmartScreen:

ss5.jpg

               

Website in the Security Blacklist will be blocked by SmartScreen as shown in the following example:

TanTran_0-1610791137995.png

 

Malicious apps will be blocked by Defender SmartScreen as shown in this example: 

TanTran_0-1610792348644.png

 

  • To Record SmartScreen action in Windows Event Log we would enable SmartScreen debug mode by running the following command:
    wevtutil sl Microsoft-Windows-SmartScreen/Debug /e:true                                                            ​
                     TanTran_0-1610870916502.png

The following Events are appeared in Event Viewer

Windows Logs\Applications and Services Logs\Microsoft\Windows\SmartScreen\Debug

TanTran_1-1610870916551.png

Also, by default, windows sense and telemetry service will collect and transport the SmartScreen event to the Microsoft Defender for Endpoint Cloud Service.

  • Use Defender Advanced Hunting to search, It was an information event so we could  go hunting for the related and important information such as the names of devices infected by the malware file, the original Web address who propagate the files, file size, file hash, …

Malicious file query ‘s result :

ss7.jpg

  • We got the source which originate the malicious distribution, in our test case, it is https://demo.smartscreen.msft.net. We also get from the result, the external IP address of the involved site, "23.99.0.12" as shown here:

TanTran_1-1611009046110.png

 

  • We need to search for all the file-download-attacks originated from this web site:

 

 

DeviceFileEvents
|where Timestamp > ago(7d)
| where FileOriginUrl contains "https://demo.smartscreen.msft.net"
| project Timestamp, DeviceName, InitiatingProcessAccountSid, FileName, FolderPath, FileOriginUrl, SHA1, FileOriginIP, FileSize, InitiatingProcessFileName

 

 

The query result has just shown another attack by download with file named “freevideo.exe”. It seems to be downloaded the 6th time of same file on the device named fc-cl01:

TanTran_1-1610994978955.png

 

  • Now we need to find any suspicious events detected on fc-cl01 device during the attack period of 1/17/2021, around the point of time 5:33 AM, we assume the attacking duration and set the period for about 5 hour.

Translating it to Kusto query language means “Timestamp between (datetime(2021-01-17T05:00:00.01) .. datetime(2021-01-17T10:00:00.01))”

We will search the File Event, Device Event during the attack period:

 

 

DeviceFileEvents
| where DeviceName contains "fc-cl01"
| where Timestamp between (datetime(2021-01-17T05:00:00.01) .. datetime(2021-01-17T10:00:00.01))
| where FileName !contains "MicrosoftEdge"

 

 

Query result shown another unauthorized app named "PotentiallyUnwanted(2).exe" was downloaded at 1/17/2021 9:47:30, possibly the second time on same device:

TanTran_2-1610994978979.png

  • We want more information about the Device Event related download (.lnk) and executable (.exe) file. We would search:

 

 

DeviceEvents
|where DeviceName contains "fc-cl01"
|where Timestamp between (datetime(2021-01-17T05:00:00.01) .. datetime(2021-01-17T06:00:00.01))
|where FileName contains ".exe" or FileName contains ".lnk"
|where FileName !contains "MicrosoftEdge"
|project Timestamp, DeviceName, FileName, FolderPath, FileOriginUrl, AdditionalFields, InitiatingProcessCreationTime

 

 

Query result shown the download link named "com.amtso.mobiletestfilepua.apk.lnk" was advertised and download at 1/17/2021 5:34:09 and may not related to the "PotentiallyUnwanted(2).exe" which had different downloading time at 9:47:30  :

TanTran_3-1610994978984.png

We have a total view of Web link, Web download attacking landscape thanks to Defender for Endpoint - Advanced Hunting who worked in tandem with SmartScreen Events.

 

Submit File for Whitelisting to Microsoft Security Intelligence 

In rare case, you may possibly experience a false positive block or warning by Defender SmartScreen when you are accessing in-house Web Apps with the appropriate URL or when browsing to a useful public website with the legitimate URLs and you think there is a need to whitelist those URLs. 

Generally, there should be a direct link in the product app notification windows, for error reporting to Microsoft Security Support. In case of Defender SmartScreen, the link  in the notification is shown in the following screenshot: 

TanTran_2-1610791270287.png

 

You should provide the information to the Defender SmartScreen Support Team if your Site gets a false-positive alarm of blockage or gets a false positive warning of unknow web site..., the following screenshot shown the report's content:

TanTran_3-1610791334918.png  

For report about the legitimate download been blocked or warned, you could manually submit the sample files by accessing the WDSI Website and choose to submit it as an enterprise user or as developer. (Of course, you are also able to submit file as a home user too.) 

TanTran_4-1610791395160.png 

 TanTran_5-1610791458548.png

 

  • To upload sample file with size more than 500MB, you could compress it by Zip or RAR archive. 
  • You could report bad file to be included in the Blacklist to prevent access or report legitimate file for Whitelist access. 

TanTran_6-1610791505824.png

 

 

  • You could submit a request for almost any of Microsoft’s software and service from the dropped down list of the Form: 

 

TanTran_7-1610791547915.png

TanTran_8-1610791602278.png

TanTran_9-1610791639136.png

 

Microsoft goal is to minimize false warnings or blocks. In the rare case of a false warning, Microsoft offered a web-based feedback system to help users and website owners report any errors as quickly as possible. These reports are verified by the support team and mistakes are corrected. Enterprise Premier Customer will get the highest priority in response time. 

 

Flash Player should be removed from the Sites after December 2020 

  • Flash will  be disabled from Microsoft Edge classic (Edge legacy) or Internet Explorer 11 by December of 2020.  
  • Group policies are available for enterprise admins and IT pros to change the Flash behavior 

TanTran_0-1610848296923.png

 

Flash will be completely removed from all browsers by December 31, 2020, via Windows Update.  Companies reliant on Flash for development and playback of content are encouraged to remove the dependency on Adobe Flash prior to December 2020. 

 We could not express enough about the importance of Windows Defender SmartScreen at the forefront to defense our systems from weblink attacks and download attacks. We should periodically check if there is any device in our corporate network running apps and browser without Windows Defender SmartScreen. We could do a devices' registry check by Endpoint Configuration Manager - Configuration Item baseline or by Endpoint Manager - Endpoint Analytics Scripting. 

I hope the information is useful.

Until next time, then.

 

Reference: 

 

Disclaimer
The sample scripts are not supported under any Microsoft standard support program or service. 
The sample scripts are provided AS IS without warranty of any kind. Microsoft further disclaims
all implied warranties including, without limitation, any implied warranties of merchantability or
of fitness for a particular purpose. The entire risk arising out of the use or performance of the
sample scripts and documentation remains with you. In no event shall Microsoft, its authors, or
anyone else involved in the creation, production, or delivery of the scripts be liable for any
damages whatsoever (including, without limitation, damages for loss of business profits, business
interruption, loss of business information, or other pecuniary loss) arising out of the use of or
inability to use the sample scripts or documentation, even if Microsoft has been advised of the
possibility of such damages.

 

%3CLINGO-SUB%20id%3D%22lingo-sub-2066746%22%20slang%3D%22en-US%22%3EWindows%20Defender%26nbsp%3BSmartScreen%26nbsp%3B-%26nbsp%3BFile%20and%20Flash%20Player%20Blockage%26nbsp%3BProblem%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2066746%22%20slang%3D%22en-US%22%3E%3CP%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%26nbsp%3B%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22SmartScreen.gif%22%20style%3D%22width%3A%20530px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F246887iC6DC9B5EB8E9DDC3%2Fimage-dimensions%2F530x375%3Fv%3D1.0%22%20width%3D%22530%22%20height%3D%22375%22%20role%3D%22button%22%20title%3D%22SmartScreen.gif%22%20alt%3D%22SmartScreen.gif%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%224%22%20color%3D%22%23000000%22%3EDear%20IT%20pros%2C%26nbsp%3B%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%223%22%20color%3D%22%23000000%22%3EToday%20we%20discuss%20about%20Windows%20Defender%20SmartScreen%20features%20and%20follow%20its%20activities%20in%20defending%20our%20systems%20from%20Web%20link%20and%20Web%20download%20attacks.%20We%20then%2C%20address%20the%20problem%20with%20false%20positive%20blockage%20by%20SmartScreen.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%20color%3D%22%230000FF%22%3E%3CSTRONG%3EWindows%20Defender%20SmartScreen%20Features%26nbsp%3B%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3ESmart%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EScreen%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eha%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Es%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ebecome%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Ba%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Epart%20of%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EWindows%2010%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EOS%2C%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eit%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ewa%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Es%20named%20as%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EWindows%20Defender%20SmartScreen.%20It%20is%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Euseful%20to%20protect%20not%20just%20Edge%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%2C%20Internet%20Explorer%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eb%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Erowser%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Es%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bbut%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ealso%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eother%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eapplications%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bsuch%20as%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Ethird-party%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3Bbrowser%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Es%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%2C%20Email%20Client%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3Band%20Apps%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Efrom%20malicious%20Web%20link%20attack%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%2C%20malicious%20Web%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Edownload%20threat.%20Let%20us%20have%20a%20quick%20look%20into%20SmartScreen%20function%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eali%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eties%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%3A%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%222%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%221%22%20data-aria-level%3D%221%22%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22none%22%3EAnti-phishing%20and%20anti-malware%20support.%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-contrast%3D%22none%22%3E%E2%80%AFMicrosoft%20Defender%20SmartScreen%20helps%20to%20protect%20users%20from%20sites%20that%20are%20reported%20to%20host%20phishing%20attacks%20or%20attempt%20to%20distribute%20malicious%20software.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559685%26quot%3B%3A1290%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%222%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%221%22%20data-aria-level%3D%221%22%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22none%22%3EPrevent%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3Bdrive-by%20attacks%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-contrast%3D%22none%22%3E.%20Drive-by%20attacks%20are%20web-based%20attacks%20that%20tend%20to%20start%20on%20a%20trusted%20site%2C%20targeting%20security%20vulnerabilities%20in%20commonly%20used%20software.%20Because%20drive-by%20attacks%20can%20happen%20even%20if%20the%20user%20does%20not%20click%20or%20download%20anything%20on%20the%20page%2C%20the%20danger%20often%20goes%20unnoticed.%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559685%26quot%3B%3A1290%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%222%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%222%22%20data-aria-level%3D%221%22%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22none%22%3EReputation-based%20URL%20and%20app%20protection.%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-contrast%3D%22none%22%3E%E2%80%AFMicrosoft%20Defender%20SmartScreen%20evaluates%20a%20website's%20URLs%20to%20determine%20if%20they're%20known%20to%20distribute%20or%20host%20unsafe%20content%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E.%20It%20also%20provides%20reputation%20checks%20for%20apps%2C%20checking%20downloaded%20programs%20and%20the%20digital%20signature%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Eused%20to%20sign%20a%20file%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E.%20If%20a%20URL%2C%20a%20file%2C%20an%20app%2C%20or%20a%20certificate%20has%20an%20established%20reputation%2C%20users%20won't%20see%20any%20warnings.%20If%2C%20however%2C%20there's%20no%20reputation%2C%20the%20item%20is%20marked%20as%20a%20higher%20risk%20and%20presents%20a%20warning%20to%20the%20user.%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559685%26quot%3B%3A1290%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%222%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%223%22%20data-aria-level%3D%221%22%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22none%22%3EImproved%20heuristics%20and%20diagnostic%20data.%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-contrast%3D%22none%22%3E%E2%80%AFMicrosoft%20Defender%20SmartScreen%20is%20constantly%20learning%20and%20endeavoring%20to%20stay%20up%20to%20date%2C%20so%20it%20can%20help%20to%20protect%20you%20against%20potentially%20malicious%20sites%20and%20files.%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559685%26quot%3B%3A1290%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%222%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%224%22%20data-aria-level%3D%221%22%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22none%22%3EBlocking%20URLs%20associated%20with%20potentially%20unwanted%20applications.%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-contrast%3D%22none%22%3E%E2%80%AF%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Esoftware%20that%20can%20cause%20your%20machine%20to%20run%20slowly%2C%20display%20unexpected%20ads%2C%20or%20at%20worst%2C%20install%20other%20software%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%222%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%224%22%20data-aria-level%3D%221%22%3E%3CSTRONG%3EConfigure%20SmartScreen%20by%20GPO.%20%3C%2FSTRONG%3EYou%20could%20enable%20SmartScreen%20for%20all%20devices%20by%20group%20policy.%20There%20are%20separated%20policies%20for%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-smartscreen%2Fmicrosoft-defender-smartscreen-available-settings%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EIE%2C%20Edge%20and%20Explorer%3C%2FA%3E.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%20style%3D%22font-family%3A%20inherit%3B%22%3EConfigure%20SmartScreen%20by%20Windows%20Security%20App.%3C%2FSTRONG%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3E%20You%20could%20enable%20SmartScreen%20to%20act%20on%20%3C%2FSPAN%3E%3CA%20style%3D%22font-family%3A%20inherit%3B%20background-color%3A%20%23ffffff%3B%22%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-smartscreen%2Fmicrosoft-defender-smartscreen-set-individual-device%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EFiles%2C%20Apps%20and%20Edge%20browser%20of%20a%20device%20by%20Windows%20Security%20Center%3C%2FA%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3E%20as%20shown%20here%3A%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22ss1.jpg%22%20style%3D%22width%3A%20643px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F246993iE8FBA538F6840A22%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22ss1.jpg%22%20alt%3D%22ss1.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EIn%20your%20environment%2C%20every%20device%20should%20be%20able%20to%20pass%20the%20SmartScreen%20tests%20%3C%2FSTRONG%3Eprovided%20from%20the%20web%20site%20named%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdemo.smartscreen.msft.net%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EMicrosoft%20Defender%20SmartScreen%20Demo%20(msft.net)%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3BThose%20tests%20did%20not%20contain%20any%20harmful%20file%20but%20only%20virus%20simulation%20files%20and%20would%20be%20harmless.%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3EYour%20testing%20device%20configured%20with%20SmartScreen%20should%20be%20able%20to%20prevent%20the%20users'%20accesses%20to%20phishing%20web%20page%2C%20malware%20web%20page%2C%20advertise%20web%20page%2C%20exploit-browser-vulnerability%20web%20page%20and%20block%20the%20download%20of%20malicious%20apps%2C%20potentially%20unwanted%20apps%20(PUA)%2C%20known%20malware%20files.%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22ss4.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F247024i7B05D22AC1C75642%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22ss4.jpg%22%20alt%3D%22ss4.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3ESmartScreen%20should%20also%20be%20able%20to%20give%20warning%20of%20unknown%20apps%20and%20suspicious%20phishing%20web%20page.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3EAn%20example%20of%20suspicious%20phishing%20site%20warned%20by%20SmartScreen%3A%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22ss6.jpg%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F247027i74B74650EBB550FB%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22ss6.jpg%22%20alt%3D%22ss6.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3EExamples%20of%20downloads%20blocked%20by%20SmartScreen%3A%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22ss5.jpg%22%20style%3D%22width%3A%20985px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F247019i637B63C4AE6EE74B%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22ss5.jpg%22%20alt%3D%22ss5.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%3EWebsite%20in%20the%20Security%20B%3C%2FSPAN%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%22%20data-contrast%3D%22none%22%3Elacklist%20will%20be%20blocked%20by%20SmartScreen%20as%20shown%20in%20the%20following%20example%3A%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_0-1610791137995.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F246888i9A4249135FEDB38C%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TanTran_0-1610791137995.png%22%20alt%3D%22TanTran_0-1610791137995.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559685%26quot%3B%3A930%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSPAN%20data-contrast%3D%22none%22%3EMalicious%20apps%20will%20be%20block%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Eed%20by%20Defender%20SmartScreen%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3Bas%20shown%20in%20this%20example%3A%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559685%26quot%3B%3A930%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_0-1610792348644.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F246899i337A647F2B2B8D28%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22TanTran_0-1610792348644.png%22%20alt%3D%22TanTran_0-1610792348644.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559685%26quot%3B%3A930%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CUL%20class%3D%22lia-list-style-type-disc%22%3E%0A%3CLI%3E%3CSTRONG%3ETo%20Record%20SmartScreen%20action%20in%20Windows%20Event%20Log%3C%2FSTRONG%3E%20we%20would%20enable%20SmartScreen%20debug%20mode%20by%20running%20the%20following%20command%3A%3CPRE%20class%3D%22lia-code-sample%20language-applescript%22%3E%3CCODE%3Ewevtutil%20sl%20Microsoft-Windows-SmartScreen%2FDebug%20%2Fe%3Atrue%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%E2%80%8B%3C%2FCODE%3E%3C%2FPRE%3E%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%20%26nbsp%3B%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_0-1610870916502.png%22%20style%3D%22width%3A%20643px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F247035i261879E5B0D8E1F6%2Fimage-dimensions%2F643x145%3Fv%3D1.0%22%20width%3D%22643%22%20height%3D%22145%22%20role%3D%22button%22%20title%3D%22TanTran_0-1610870916502.png%22%20alt%3D%22TanTran_0-1610870916502.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3EThe%20following%20Events%20are%20appeared%20in%20Event%20Viewer%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3EWindows%20Logs%5CApplications%20and%20Services%20Logs%5CMicrosoft%5CWindows%5CSmartScreen%5CDebug%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_1-1610870916551.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F247037iE7B6689544B48B53%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TanTran_1-1610870916551.png%22%20alt%3D%22TanTran_1-1610870916551.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3EAlso%2C%20by%20default%2C%20windows%20sense%20and%20telemetry%20service%20will%20collect%20and%20transport%20the%20SmartScreen%20event%20to%20the%20Microsoft%20Defender%20for%20Endpoint%20Cloud%20Service.%3C%2FP%3E%0A%3CUL%20class%3D%22lia-list-style-type-disc%22%3E%0A%3CLI%3E%3CSTRONG%3EUse%20Defender%20Advanced%20Hunting%20to%20search%2C%20%3C%2FSTRONG%3EIt%20was%20an%20information%20event%20so%20we%20could%26nbsp%3B%20go%20hunting%20for%20the%20related%20and%20important%20information%20such%20as%20the%20names%20of%20devices%20infected%20by%20the%20malware%20file%2C%20the%20original%20Web%20address%20who%20propagate%20the%20files%2C%20file%20size%2C%20file%20hash%2C%20%E2%80%A6%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3EMalicious%20file%20query%20%E2%80%98s%20result%20%3A%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22ss7.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F247039iDCC2048A7D0E8C03%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22ss7.jpg%22%20alt%3D%22ss7.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CUL%20class%3D%22lia-list-style-type-square%22%3E%0A%3CLI%20class%3D%22lia-indent-padding-left-30px%22%3EWe%20got%20the%20source%20which%20originate%20the%20malicious%20distribution%2C%20in%20our%20test%20case%2C%20it%20is%20%3CA%20href%3D%22https%3A%2F%2Fdemo.smartscreen.msft.net%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Ehttps%3A%2F%2Fdemo.smartscreen.msft.net.%3C%2FA%3E%26nbsp%3BWe%20also%20get%20from%20the%20result%2C%20the%20external%20IP%20address%20of%20the%20involved%20site%2C%20%2223.99.0.12%22%20as%20shown%20here%3A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_1-1611009046110.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F247346iB333768C08348417%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TanTran_1-1611009046110.png%22%20alt%3D%22TanTran_1-1611009046110.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%20class%3D%22lia-list-style-type-square%22%3E%0A%3CLI%20class%3D%22lia-indent-padding-left-30px%22%3EWe%20need%20to%20search%20for%20all%20the%20file-download-attacks%20originated%20from%20this%20web%20site%3A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-bash%22%3E%3CCODE%3EDeviceFileEvents%0A%7Cwhere%20Timestamp%20%26gt%3B%20ago(7d)%0A%7C%20where%20FileOriginUrl%20contains%20%22https%3A%2F%2Fdemo.smartscreen.msft.net%22%0A%7C%20project%20Timestamp%2C%20DeviceName%2C%20InitiatingProcessAccountSid%2C%20FileName%2C%20FolderPath%2C%20FileOriginUrl%2C%20SHA1%2C%20FileOriginIP%2C%20FileSize%2C%20InitiatingProcessFileName%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3EThe%20query%20result%20has%20just%20shown%20another%20attack%20by%20download%20with%20file%20named%20%E2%80%9Cfreevideo.exe%E2%80%9D.%20It%20seems%20to%20be%20downloaded%20the%206th%20time%20of%20same%20file%20on%20the%20device%20named%20fc-cl01%3A%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_1-1610994978955.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F247308i5F83EB45C3AA163B%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TanTran_1-1610994978955.png%22%20alt%3D%22TanTran_1-1610994978955.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%20class%3D%22lia-list-style-type-square%22%3E%0A%3CLI%20class%3D%22lia-indent-padding-left-30px%22%3ENow%20we%20need%20to%20find%20any%20suspicious%20events%20detected%20on%20fc-cl01%20device%20during%20the%20attack%20period%20of%201%2F17%2F2021%2C%20around%20the%20point%20of%20time%205%3A33%20AM%2C%20we%20assume%20the%20attacking%20duration%20and%20set%20the%20period%20for%20about%205%20hour.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3ETranslating%20it%20to%20Kusto%20query%20language%20means%20%E2%80%9CTimestamp%20between%20(datetime(2021-01-17T05%3A00%3A00.01)%20..%20datetime(2021-01-17T10%3A00%3A00.01))%E2%80%9D%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3EWe%20will%20search%20the%20File%20Event%2C%20Device%20Event%20during%20the%20attack%20period%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-bash%22%3E%3CCODE%3EDeviceFileEvents%0A%7C%20where%20DeviceName%20contains%20%22fc-cl01%22%0A%7C%20where%20Timestamp%20between%20(datetime(2021-01-17T05%3A00%3A00.01)%20..%20datetime(2021-01-17T10%3A00%3A00.01))%0A%7C%20where%20FileName%20!contains%20%22MicrosoftEdge%22%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3EQuery%20result%20shown%20another%20unauthorized%20app%20named%20%22PotentiallyUnwanted(2).exe%22%20was%20downloaded%20at%201%2F17%2F2021%209%3A47%3A30%2C%20possibly%20the%20second%20time%20on%20same%20device%3A%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_2-1610994978979.png%22%20style%3D%22width%3A%20974px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F247309i097DDF562DB3D04B%2Fimage-dimensions%2F974x279%3Fv%3D1.0%22%20width%3D%22974%22%20height%3D%22279%22%20role%3D%22button%22%20title%3D%22TanTran_2-1610994978979.png%22%20alt%3D%22TanTran_2-1610994978979.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CUL%20class%3D%22lia-list-style-type-square%22%3E%0A%3CLI%20class%3D%22lia-indent-padding-left-30px%22%3EWe%20want%20more%20information%20about%20the%20Device%20Event%20related%20download%20(.lnk)%20and%20executable%20(.exe)%20file.%20We%20would%20search%3A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CPRE%20class%3D%22lia-code-sample%20language-bash%22%3E%3CCODE%3EDeviceEvents%0A%7Cwhere%20DeviceName%20contains%20%22fc-cl01%22%0A%7Cwhere%20Timestamp%20between%20(datetime(2021-01-17T05%3A00%3A00.01)%20..%20datetime(2021-01-17T06%3A00%3A00.01))%0A%7Cwhere%20FileName%20contains%20%22.exe%22%20or%20FileName%20contains%20%22.lnk%22%0A%7Cwhere%20FileName%20!contains%20%22MicrosoftEdge%22%0A%7Cproject%20Timestamp%2C%20DeviceName%2C%20FileName%2C%20FolderPath%2C%20FileOriginUrl%2C%20AdditionalFields%2C%20InitiatingProcessCreationTime%3C%2FCODE%3E%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3EQuery%20result%20shown%20the%20download%20link%20named%20%22%3CSPAN%3Ecom.amtso.mobiletestfilepua.apk.lnk%22%3C%2FSPAN%3E%26nbsp%3Bwas%20advertised%20and%20download%20at%201%2F17%2F2021%205%3A34%3A09%20and%20may%20not%20related%20to%20the%26nbsp%3B%22PotentiallyUnwanted(2).exe%22%20which%20had%20different%20downloading%20time%20at%209%3A47%3A30%20%26nbsp%3B%3A%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_3-1610994978984.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F247310i145B7F39FD5FE961%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TanTran_3-1610994978984.png%22%20alt%3D%22TanTran_3-1610994978984.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3EWe%20have%20a%20total%20view%20of%20Web%20link%2C%20Web%20download%20attacking%20landscape%20thanks%20to%20Defender%20for%20Endpoint%20-%20Advanced%20Hunting%20who%20worked%20in%20tandem%20with%20SmartScreen%20Events.%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%225%22%20color%3D%22%230000FF%22%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22none%22%3ESubmit%20File%20for%20Whitelisting%20to%20Microsoft%20Security%20Intelligence%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EIn%20rare%20case%2C%20you%20may%20possibly%20experience%20a%20false%20positive%20block%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bor%20warning%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bby%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EDefender%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3ESmartScreen%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ewhen%20you%20are%20accessing%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bin-house%20Web%20App%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Es%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bwith%20the%20appropriate%20URL%20or%20when%20browsing%20to%20a%20useful%20public%20w%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eebsite%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bwith%20the%20legitimate%20URLs%20and%20you%20think%20there%20is%20a%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eneed%20to%20whitelist%20those%20URLs.%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EGenerally%2C%20t%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ehere%20should%20be%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Ba%20direct%20link%20in%20the%20product%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bapp%20notification%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bwindows%2C%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Efor%20error%20reporting%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eto%20Microsoft%20Security%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3ESupport.%20In%20case%20of%20Defender%20SmartScreen%2C%20the%20link%26nbsp%3B%20in%20the%20notification%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bis%20shown%20in%20the%20following%20screenshot%3A%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_2-1610791270287.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F246890i299B0E22472F4983%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TanTran_2-1610791270287.png%22%20alt%3D%22TanTran_2-1610791270287.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EYou%20should%20p%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Erovide%20the%20information%20to%20the%20Defender%20SmartScreen%20Support%20Team%20if%20your%20Site%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Egets%20a%20false-positive%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ealarm%20of%20blockage%20or%20gets%20a%20false%20positive%20warning%20of%20unknow%20web%20site...%2C%20the%20following%20screenshot%20shown%20the%20report's%20content%3A%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_3-1610791334918.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F246891i41E3F2FD464E48BF%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TanTran_3-1610791334918.png%22%20alt%3D%22TanTran_3-1610791334918.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22auto%22%3EFor%20report%20about%20the%20legitimate%20download%20been%20blocked%20or%20warned%2C%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eyou%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ecould%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bmanually%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bsubmit%20the%20sample%20files%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bby%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eaccessing%20the%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3BWDSI%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3BWebsite%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eand%20choose%20to%20submit%20it%20as%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ean%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ee%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Enterprise%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Euser%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eor%20as%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ea%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Edeveloper%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E(Of%20course%2C%20y%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eou%20are%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ealso%20able%20to%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Esubmit%20file%20as%20a%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eh%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eome%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Euser%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Btoo%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E.%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E)%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%224%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%221%22%20data-aria-level%3D%221%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3ETo%20submit%20file%2C%20browse%20to%20%3A%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fwdsi%2Ffilesubmission%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22none%22%3Ehttps%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fwdsi%2Ffilesubmission%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%26nbsp%3B%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_4-1610791395160.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F246892i981C873392446BC0%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TanTran_4-1610791395160.png%22%20alt%3D%22TanTran_4-1610791395160.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559685%26quot%3B%3A1440%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559685%26quot%3B%3A2160%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_5-1610791458548.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F246893i96AB0F551F6A2DA2%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TanTran_5-1610791458548.png%22%20alt%3D%22TanTran_5-1610791458548.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559685%26quot%3B%3A2160%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%224%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%221%22%20data-aria-level%3D%221%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3ETo%20upload%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Esample%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Efile%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ewith%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Esize%20more%20than%20500MB%2C%20you%20could%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ecompress%20it%20by%20Zip%20or%20RAR%20archive.%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%224%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%222%22%20data-aria-level%3D%221%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3EYou%20could%20report%20bad%20file%20to%20be%20included%20in%20the%20Blacklist%20to%20prevent%20access%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eor%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Ereport%20legitimate%20file%20for%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EWhitelist%20%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eaccess.%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_6-1610791505824.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F246894i285253DC34EB4337%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TanTran_6-1610791505824.png%22%20alt%3D%22TanTran_6-1610791505824.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559685%26quot%3B%3A2160%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%225%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%221%22%20data-aria-level%3D%221%22%3E%3CSPAN%20data-contrast%3D%22auto%22%3EYou%20could%20submit%20a%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Erequest%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Efor%20almost%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bany%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3Eof%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3EMicrosoft%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%E2%80%99s%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bsoftware%20and%20service%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bfrom%20the%20dropped%20down%20list%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%26nbsp%3Bof%20the%20Form%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22auto%22%3E%3A%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559685%26quot%3B%3A1440%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_7-1610791547915.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F246896i6E28C3C5DF1A6458%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TanTran_7-1610791547915.png%22%20alt%3D%22TanTran_7-1610791547915.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_8-1610791602278.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F246897iB3AF32A1573F2EA6%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22TanTran_8-1610791602278.png%22%20alt%3D%22TanTran_8-1610791602278.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20class%3D%22lia-indent-padding-left-60px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_9-1610791639136.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F246898i281379BC3377FE43%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22TanTran_9-1610791639136.png%22%20alt%3D%22TanTran_9-1610791639136.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-contrast%3D%22none%22%3EMicrosoft%20goal%20is%20to%20minimize%20false%20warnings%20or%20blocks.%20In%20the%20rare%20case%20of%20a%20false%20warning%2C%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3EMicrosoft%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3Boffer%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Eed%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3Ba%20web-based%20feedback%20system%20to%20help%20users%20and%20website%20owners%20report%20any%20errors%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Eas%20quickly%20as%20possible%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E.%20These%20reports%20are%20verified%20by%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Ethe%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3Bsupport%20team%20and%20mistakes%20are%20corrected.%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3BEnterprise%20Premier%20Customer%20will%20get%20the%20highest%20prio%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3Erity%20in%20response%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3Btime.%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559685%26quot%3B%3A720%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20color%3D%22%230000FF%22%3E%3CFONT%20size%3D%225%22%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22none%22%3EFlash%20Player%20should%20be%20removed%20from%20the%26nbsp%3B%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22none%22%3ESites%20after%20December%202020%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FFONT%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FFONT%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%225%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%221%22%20data-aria-level%3D%221%22%3E%3CSPAN%20data-contrast%3D%22none%22%3E%3CA%20href%3D%22https%3A%2F%2Fhelpx.adobe.com%2Facrobat%2Fkb%2Fflash-format-support-in-pdf.html%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EAdobe%20has%20ended%20support%20of%20Flash%20Player%20on%20December%2031%2C%202020%3C%2FA%3E%26nbsp%3Bas%20per%20the%20following%20statement%3A%20%22Adobe%20will%20end%20support%20for%20Flash%20Player%20at%20the%20end%20of%202020%20and%20encourages%20content%20creators%20to%20migrate%20any%20existing%20Flash%20content%20to%20new%20open%20formats%2C%20such%20as%26nbsp%3BHTML5%2C%20WebGL%2C%20and%20WebAssembly...%20%3C%2FSPAN%3EPlayback%20of%20Flash%20media%20(*.flv%20and%20*.swf)%20content%20in%20existing%20PDFs%20will%20not%20be%20supported.%3CSPAN%20data-contrast%3D%22none%22%3E%22%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%225%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%221%22%20data-aria-level%3D%221%22%3E%3CSPAN%20data-contrast%3D%22none%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fadobe-wants-users-to-uninstall-flash-player-by-the-end-of-the-year%2F%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3EAccording%20to%20Zdnet%3C%2FA%3E%2C%26nbsp%3B%20%22Adobe%20plans%20to%20prompt%20users%20and%20ask%20them%20to%20uninstall%20Flash%20Player%20from%20their%20computers%20by%20the%20end%20of%20the%20year%20when%20the%20software%20is%20scheduled%20to%20reach%20%3CA%20href%3D%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fadobe-wants-users-to-uninstall-flash-player-by-the-end-of-the-year%2F%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3EEnd-Of-Life%20(EOL)%2C%20on%20December%2031%2C%202020..%3C%2FA%3E.%20Furthermore%2C%20Adobe%20also%20said%20that%20%22Flash-based%20content%20will%20be%20blocked%20from%20running%20in%20Adobe%20Flash%20Player%20after%20the%20EOL%20Date...%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3EThe%20new%20update%20also%20brings%20an%20actual%20date%20to%20Flash's%20actual%20demise%20in%20the%20form%20of%20January%2012%2C%202021%20%E2%80%94%20%3CA%20href%3D%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fadobe-to-block-flash-content-from-running-on-january-12-2021%2F%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ethe%20date%20after%20which%20any%20type%20of%20Flash%20content%20won't%20run%20inside%20the%20Flash%20app%3C%2FA%3E.%22%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%225%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%222%22%20data-aria-level%3D%221%22%3E%3CSPAN%20data-contrast%3D%22none%22%3EIn%20Microsoft%20Edge%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3EChromium%2C%20Flash%20will%20be%20disabled%20by%20default.%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CUL%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%225%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%221%22%20data-aria-level%3D%221%22%3E%3CSPAN%20data-contrast%3D%22none%22%3EFlash%20will%E2%80%AF%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%E2%80%AFbe%20disabled%20from%20Microsoft%20Edge%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3Bclassic%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3B(%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3EEdge%20legacy%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E)%20or%20Internet%20Explorer%2011%20by%20December%20of%202020.%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22%EF%82%B7%22%20data-font%3D%22Symbol%22%20data-listid%3D%225%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%222%22%20data-aria-level%3D%221%22%3E%3CA%20href%3D%22https%3A%2F%2F4sysops.com%2Farchives%2Fend-of-support-block-or-uninstall-adobe-flash-using-group-policies-or-wsus%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22none%22%3EGroup%20policies%20are%20available%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22none%22%3E%E2%80%AFfor%20enterprise%20admins%20and%20IT%20pros%20to%20change%20the%20Flash%20behavior%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%20class%3D%22lia-indent-padding-left-30px%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TanTran_0-1610848296923.png%22%20style%3D%22width%3A%20775px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F247004i7713689CA1B9478E%2Fimage-dimensions%2F775x627%3Fv%3D1.0%22%20width%3D%22775%22%20height%3D%22627%22%20role%3D%22button%22%20title%3D%22TanTran_0-1610848296923.png%22%20alt%3D%22TanTran_0-1610848296923.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22none%22%3EFlash%20will%20be%20completely%20removed%20from%20all%20browsers%20by%20December%2031%2C%202020%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-contrast%3D%22none%22%3E%2C%20via%20Windows%20Update.%E2%80%AF%26nbsp%3B%3C%2FSPAN%3E%3CSPAN%20data-contrast%3D%22none%22%3ECompanies%20reliant%20on%20Flash%20for%20development%20and%20playback%20of%20content%20are%20encouraged%20to%20remove%20the%20dependency%20on%20Adobe%20Flash%20prior%20to%20December%202020.%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3E%26nbsp%3BWe%20could%20not%20express%20enough%20about%20the%20importance%20of%20Windows%20Defender%20SmartScreen%20at%20the%20forefront%20to%20defense%20our%20systems%20from%20weblink%20attacks%20and%20download%20attacks.%20We%20should%20periodically%20check%20if%20there%20is%20any%20device%20in%20our%20corporate%20network%20running%20apps%20and%20browser%20without%20Windows%20Defender%20SmartScreen.%20We%20could%20do%20a%20devices'%20registry%20check%20by%20Endpoint%20Configuration%20Manager%20-%20Configuration%20Item%20baseline%20or%20by%20Endpoint%20Manager%20-%20Endpoint%20Analytics%20Scripting.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3EI%20hope%20the%20information%20is%20useful.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233117%26quot%3B%3Atrue%2C%26quot%3B134233118%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A240%7D%22%3EUntil%20next%20time%2C%20then.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%20data-contrast%3D%22auto%22%3EReference%3A%3C%2FSPAN%3E%3C%2FSTRONG%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559685%26quot%3B%3A720%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%20data-leveltext%3D%22-%22%20data-font%3D%22Calibri%22%20data-listid%3D%221%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%220%22%20data-aria-level%3D%221%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-smartscreen%2Fmicrosoft-defender-smartscreen-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22none%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-smartscreen%2Fmicrosoft-defender-smartscreen-overview%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22-%22%20data-font%3D%22Calibri%22%20data-listid%3D%221%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%220%22%20data-aria-level%3D%221%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-smartscreen%2Fmicrosoft-defender-smartscreen-set-individual-device%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3ESet%20up%20and%20use%20Microsoft%20Defender%20SmartScreen%20on%20individual%20devices%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22-%22%20data-font%3D%22Calibri%22%20data-listid%3D%221%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%220%22%20data-aria-level%3D%221%22%3E%3CA%20href%3D%22https%3A%2F%2Ffb.smartscreen.microsoft.com%2Fsmartscreenfaq.aspx%23%3A~%3Atext%3DMicrosoft%2520Defender%2520SmartScreen%2520is%2520a%2520feature%2520of%2520Windows%252C%2Calso%2520helps%2520protect%2520you%2520from%2520downloading%2520malicious%2520software.%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20SmartScreen%20Frequently%20Asked%20Questions%3C%2FA%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22-%22%20data-font%3D%22Calibri%22%20data-listid%3D%221%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%220%22%20data-aria-level%3D%221%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-smartscreen%2Fmicrosoft-defender-smartscreen-available-settings%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22none%22%3EAvailable%20Microsoft%20Defender%20SmartScreen%20Group%20Policy%20and%20mobile%20device%20management%20(MDM)%20settings%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-contrast%3D%22none%22%3E.%3C%2FSPAN%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22-%22%20data-font%3D%22Calibri%22%20data-listid%3D%221%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%220%22%20data-aria-level%3D%221%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-antivirus%2Fdetect-block-potentially-unwanted-apps-microsoft-defender-antivirus%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSPAN%20data-contrast%3D%22none%22%3EDetect%20and%20block%20potentially%20unwanted%20applications%3C%2FSPAN%3E%3C%2FA%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22-%22%20data-font%3D%22Calibri%22%20data-listid%3D%221%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%220%22%20data-aria-level%3D%221%22%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fadobe-wants-users-to-uninstall-flash-player-by-the-end-of-the-year%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EAdobe%20wants%20users%20to%20uninstall%20Flash%20Player%20by%20the%20end%20of%20the%20year%20%7C%20ZDNet%3C%2FA%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22-%22%20data-font%3D%22Calibri%22%20data-listid%3D%221%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%220%22%20data-aria-level%3D%221%22%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fadobe-to-block-flash-content-from-running-on-january-12-2021%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EAdobe%20to%20block%20Flash%20content%20from%20running%20on%20January%2012%2C%202021%20%7C%20ZDNet%3C%2FA%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22-%22%20data-font%3D%22Calibri%22%20data-listid%3D%221%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%220%22%20data-aria-level%3D%221%22%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B134233279%26quot%3B%3Atrue%2C%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%3CA%20href%3D%22https%3A%2F%2F4sysops.com%2Farchives%2Fend-of-support-block-or-uninstall-adobe-flash-using-group-policies-or-wsus%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EEnd%20of%20support%3A%20Block%20or%20uninstall%20Adobe%20Flash%20using%20Group%20Policy%20or%20WSUS%20%7C%204sysops%3C%2FA%3E%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%20data-leveltext%3D%22-%22%20data-font%3D%22Calibri%22%20data-listid%3D%221%22%20aria-setsize%3D%22-1%22%20data-aria-posinset%3D%220%22%20data-aria-level%3D%221%22%3E%3CA%20href%3D%22https%3A%2F%2Fwww.adobe.com%2Fproducts%2Fflashplayer%2Fend-of-life.html%22%20target%3D%22_self%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3EAdobe%20Flash%20Player%20EOL%3C%2FA%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20data-ccp-props%3D%22%7B%26quot%3B201341983%26quot%3B%3A0%2C%26quot%3B335559739%26quot%3B%3A160%2C%26quot%3B335559740%26quot%3B%3A259%7D%22%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CPRE%3E%3CFONT%20size%3D%225%22%3E%3CSTRONG%3EDisclaimer%3C%2FSTRONG%3E%3C%2FFONT%3E%0AThe%20sample%20scripts%20are%20not%20supported%20under%20any%20Microsoft%20standard%20support%20program%20or%20service.%20%3CBR%20%2F%3EThe%20sample%20scripts%20are%20provided%20AS%20IS%20without%20warranty%20of%20any%20kind.%20Microsoft%20further%20disclaims%3CBR%20%2F%3Eall%20implied%20warranties%20including%2C%20without%20limitation%2C%20any%20implied%20warranties%20of%20merchantability%20or%20%3CBR%20%2F%3Eof%20fitness%20for%20a%20particular%20purpose.%20The%20entire%20risk%20arising%20out%20of%20the%20use%20or%20performance%20of%20the%3CBR%20%2F%3Esample%20scripts%20and%20documentation%20remains%20with%20you.%20In%20no%20event%20shall%20Microsoft%2C%20its%20authors%2C%20or%20%3CBR%20%2F%3Eanyone%20else%20involved%20in%20the%20creation%2C%20production%2C%20or%20delivery%20of%20the%20scripts%20be%20liable%20for%20any%3CBR%20%2F%3Edamages%20whatsoever%20(including%2C%20without%20limitation%2C%20damages%20for%20loss%20of%20business%20profits%2C%20business%3CBR%20%2F%3Einterruption%2C%20loss%20of%20business%20information%2C%20or%20other%20pecuniary%20loss)%20arising%20out%20of%20the%20use%20of%20or%3CBR%20%2F%3Einability%20to%20use%20the%20sample%20scripts%20or%20documentation%2C%20even%20if%20Microsoft%20has%20been%20advised%20of%20the%3CBR%20%2F%3Epossibility%20of%20such%20damages.%3C%2FPRE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2066746%22%20slang%3D%22en-US%22%3E%3CP%3EHow%20to%20clear%20the%20appropriate%20web%20site%20been%20blocked%20by%20SmartScreen%2C%20how%20to%20contact%20Microsoft%20SmartScreen%20Support.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2066746%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ETanTran%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎Jan 19 2021 05:53 AM
Updated by: