Announcing an important behavior change for MDE's Endpoint Discovery

%3CLINGO-SUB%20id%3D%22lingo-sub-2338254%22%20slang%3D%22en-US%22%3EAnnouncing%20an%20important%20behavior%20change%20for%20MDE's%20Endpoint%20Discovery%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2338254%22%20slang%3D%22en-US%22%3E%3CP%3EOn%20April%206th%20we%20announced%20the%20public%20preview%20of%20Endpoint%20Discovery%20which%20enables%20Microsoft%20Defender%20for%20Endpoint%20to%20discover%20unmanaged%20workstations%2C%20servers%20and%20mobile%20devices%2C%20(Windows%2C%20Linux%2C%20macOS%2C%20iOS%2C%20and%20Android)%20on%20their%20business%20networks.%20Based%20on%20customer%20feedback%20we%20are%20switching%20the%20discovery%20functionality%20from%20a%20passive%20to%20active%20mode%20on%20Monday%20May%2010th.%20This%20will%20enable%20Endpoint%20Discovery%20to%20automatically%20discover%20a%20more%20complete%20inventory%20of%20unmanaged%20endpoints.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWith%20this%20change%20there%20are%20two%20matters%20that%20public%20preview%20customers%20may%20experience.%20The%20first%20is%20related%20to%20the%20discovery%20of%20a%20potentially%20much%20larger%20inventory%20of%20unmanaged%20endpoints.%20Those%20who%20are%20trialing%20Defender%20for%20Endpoint%20will%20notice%20this%20the%20most%20and%20are%20likely%20to%20see%20their%20Device%20Inventory%20grow%20from%20a%20small%20handful%20of%20unmanaged%20endpoints%20to%201000s%20or%20more%20depending%20on%20the%20size%20of%20their%20organization.%20A%20new%20%3CSTRONG%3EOnboarding%20status%3C%2FSTRONG%3E%20column%20has%20been%20added%20to%20the%20Device%20Inventory%20view%20to%20help%20them%20differentiate%20between%20unmanaged%20and%20managed%20devices.%20Also%20filtering%20capabilities%20have%20been%20added%20if%20they%20wish%20to%20hide%20unmanaged%20devices%20from%20view.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22ChrisHallum_0-1620505525342.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F279312iA64C870DC0358D7D%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22ChrisHallum_0-1620505525342.png%22%20alt%3D%22ChrisHallum_0-1620505525342.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20second%20issue%20customers%20may%20experience%20is%20when%203rd%20party%20threat%20detection%20and%20response%20systems%20(e.g.%3A%20EDR%2C%20NDR)%20are%20being%20used%20in%20concert%20with%20Defender%20for%20Endpoint.%20The%20active%20mode%20scanning%20may%20generate%20alerts%20in%20those%20systems.%20To%20prevent%20Defender%20for%20Endpoint%E2%80%99s%20active%20scanning%20from%20being%20detected%20as%20a%20threat%20customers%20can%20implement%20exclusions%20in%20any%20applicable%26nbsp%3B3rd%20party%20systems%20to%20ignore%20the%20scanning%20which%20has%20been%20carefully%20tuned%20to%20have%20negligible%20network%20impact.%20Information%20on%20how%20to%20configure%20the%20exclusion%20can%20be%20found%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.microsoft.com%252Fen-us%252Fmicrosoft-365%252Fsecurity%252Fdefender-endpoint%252Fdevice-discovery-faq%253Fview%253Do365-worldwide%2523my-security-tool-raised-alert-on-unicastscannerps1-or-port-scanning-activity-initiated-by-it-what-should-i-do%26amp%3Bdata%3D04%257C01%257Cchallum%2540microsoft.com%257C099958952c824acf433908d911a3f726%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637560218200897860%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3Dp9SJ6gtI6i6JkQ3zIQihcraUWc6jXhqQPwWgiJfahvg%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Ehere%3C%2FA%3E.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThank%20you%20for%20your%20participation%20in%20the%20Defender%20for%20Endpoint%20pubic%20preview.%20More%20information%20about%20Endpoint%20Discovery%20can%20be%20found%20in%20the%20following%20resources%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CUL%3E%3CLI%3EBlog%3A%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.microsoft.com%252Fsecurity%252Fblog%252F2021%252F04%252F13%252Fsecure-unmanaged-devices-with-microsoft-defender-for-endpoint-now%252F%26amp%3Bdata%3D04%257C01%257Cchallum%2540microsoft.com%257C099958952c824acf433908d911a3f726%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637560218200907855%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3DKmdD35hNCt7%252FbYcK3KdvtHZLqJMMBqbtblvaPuxSlr8%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3ESecure%20unmanaged%20devices%20with%20Microsoft%20Defender%20for%20Endpoint%20now%3C%2FA%3E%3C%2FLI%3E%3CLI%3ETechnical%20Blog%3A%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Ftechcommunity.microsoft.com%252Ft5%252Fmicrosoft-defender-for-endpoint%252Fendpoint-discovery-navigating-your-way-through-unmanaged-devices%252Fba-p%252F2248909%26amp%3Bdata%3D04%257C01%257Cchallum%2540microsoft.com%257C099958952c824acf433908d911a3f726%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637560218200907855%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3D%252FSXWWXTI3fKnVhO32MoxHZSBuZLx1yILFOkddVMHDec%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3ETechnical%20drill%20down%20on%20Endpoint%20Discovery%3C%2FA%3E%3C%2FLI%3E%3CLI%3EDocs%3A%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.microsoft.com%252Fen-us%252Fmicrosoft-365%252Fsecurity%252Fdefender-endpoint%252Fdevice-discovery%26amp%3Bdata%3D04%257C01%257Cchallum%2540microsoft.com%257C099958952c824acf433908d911a3f726%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637560218200917851%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3Dh%252FYXb2cuEf95zd0pbD%252B%252F1BmPIpH8d4JleeBxrqjzsNw%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EDevice%20Discovery%20Overview%3C%2FA%3E%3C%2FLI%3E%3CLI%3EFAQ%3A%20%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fdocs.microsoft.com%252Fen-us%252Fmicrosoft-365%252Fsecurity%252Fdefender-endpoint%252Fdevice-discovery-faq%26amp%3Bdata%3D04%257C01%257Cchallum%2540microsoft.com%257C099958952c824acf433908d911a3f726%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637560218200917851%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C1000%26amp%3Bsdata%3Db0i4COxz%252FZEk%252FkS9S8Ilp1J4B%252FCNTBhmPHEgD5P9kvo%253D%26amp%3Breserved%3D0%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EDevice%20Discovery%20Frequently%20Asked%20Questions%3C%2FA%3E%3C%2FLI%3E%3C%2FUL%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%2C%3C%2FP%3E%3CP%3EChris%20Hallum%3C%2FP%3E%3CP%3ESenior%20Product%20Manager%3C%2FP%3E%3CP%3EM365%20Security%3C%2FP%3E%3CP%3EMicrosoft%20Corporation%3C%2FP%3E%3C%2FLINGO-BODY%3E
Deleted
Not applicable

On April 6th we announced the public preview of Endpoint Discovery which enables Microsoft Defender for Endpoint to discover unmanaged workstations, servers and mobile devices, (Windows, Linux, macOS, iOS, and Android) on their business networks. Based on customer feedback we are switching the discovery functionality from a passive to active mode on Monday May 10th. This will enable Endpoint Discovery to automatically discover a more complete inventory of unmanaged endpoints.

 

With this change there are two matters that public preview customers may experience. The first is related to the discovery of a potentially much larger inventory of unmanaged endpoints. Those who are trialing Defender for Endpoint will notice this the most and are likely to see their Device Inventory grow from a small handful of unmanaged endpoints to 1000s or more depending on the size of their organization. A new Onboarding status column has been added to the Device Inventory view to help them differentiate between unmanaged and managed devices. Also filtering capabilities have been added if they wish to hide unmanaged devices from view.

 

ChrisHallum_0-1620505525342.png

 

The second issue customers may experience is when 3rd party threat detection and response systems (e.g.: EDR, NDR) are being used in concert with Defender for Endpoint. The active mode scanning may generate alerts in those systems. To prevent Defender for Endpoint’s active scanning from being detected as a threat customers can implement exclusions in any applicable 3rd party systems to ignore the scanning which has been carefully tuned to have negligible network impact. Information on how to configure the exclusion can be found here.

 

Thank you for your participation in the Defender for Endpoint pubic preview. More information about Endpoint Discovery can be found in the following resources:

 

 

Thanks,

Chris Hallum

Senior Product Manager

M365 Security

Microsoft Corporation

0 Replies