threat protection
20 TopicsDeploying and Onboarding 2008 R2
Hi all, We purchased Defender for Business Servers, and i need to install it on some 2008 R2 servers. There is no Defender for Endpoint software, so following the guides, i only have to install the MMA, but then how i know my server is protected? i need to enroll it at azure? Our servers are on-premise, and i don't know if i need to use Azure Arc (i need to pay?), anyone is using Defender for Windows Servers (On-Premise) with 2008 R2 version? Thanks in advanceSolved49KViews0likes7CommentsMS Antimalware Extension for Azure Vs Windows Defender Antivirus
folks, Based on my research - https://docs.microsoft.com/en-us/azure/security/fundamentals/antimalware It seems Antimalware and Defender use the same MS Security Essential Framework. If yes, is it required to install Antimalware on Windows 10 VM running in Azure as Win 10 OS has Defender pre-installed? Any key differentiation that make sense to allow both on Windows based VM hosted in Azure? Vasil Vasilev Thanks in advance for your time.15KViews1like5CommentsWindows Server 2019 not supported for Windows Defender ATP ?
Seeing this on 2019 servers...and found another post about deployment from Azure Security Center to 2019 not working. Is this confirmed as true ? https://social.technet.microsoft.com/Forums/sqlserver/en-US/ef491aef-30d0-4259-be6f-17c38bf1c66d/windows-defender-atp-and-server-2019?forum=WindowsDefenderATPPreview The constructor for the managed module type "Microsoft.EnterpriseManagement.Mom.Modules.WindowsDefenderATPModule.WindowsDefenderATPModule" threw an exception. This module was running in rule "Microsoft.Windows.WindowsDefenderATP.CollectEtwEvent" running for instance "" with id:"{F00EB567-BFDE-5A3D-CB1E-25426C032A51}" in management group "AOI-f39f1576-b645-4693-b6e9-fe8048bb5636". The exception text is: System.NotSupportedException: Environment is not supported: OS Name: 'Windows Server 2019 Datacenter', OS version: '10.0', OS productType: 'Server', isWorkstation=False at Microsoft.EnterpriseManagement.Mom.Modules.WindowsDefenderATPModule.WindowsDefenderATPModule.VerifySupportedEnvironment(IOperatingSystemInfoHelper osHelper, List`1 supportedEnvironments) at Microsoft.EnterpriseManagement.Mom.Modules.WindowsDefenderATPModule.WindowsDefenderATPModule..ctor(ModuleHost`1 moduleHost, XmlReader configuration, Byte[] previousState)Solved9.5KViews0likes4CommentsEndpoint Protection not installed on non-Azure servers
Hi all, I've used the "Onboard servers to Security Center" with a workspace for our non Azure servers. The agent got installed successfully and could see the server on Microsoft Defender ATP as well as active. However, on the Azure Security Center dashboard, under recommendations, I see those servers as "Endpoint Protection not installed on non-Azure servers". Have an open ticket with Microsoft for almost a month without any resolution. Anyone faced this issue before and found a possible solution? Thanks!6.1KViews0likes8CommentsSurvey: Endpoint Protection!
Hi Everyone, we need your feedback! Microsoft is actively investing in expanding endpoint protection in Azure Security Center. This is your opportunity to influence our thinking and priorities in where to invest. Here's the link to the quick, 3 question, feedback form asking your opinion on a few topics. Note: No personal information is collected in this feedback form. Thank you!3.4KViews0likes2CommentsSecurity alerts in Microsoft defender for Cloud
Hello All, we have received below security alert in Microsoft defender for cloud for our App service. 1) NMap scanning detected (for this we got the carrier and organization as Microsoft) 2) Vulnerability scanner detected 3) Suspicious User Agent detected Our website is Internet facing (Public facing). so, we cannot put much restriction on our app service (ex IP restriction, SSL certificate). We are unable to investigate the below alerts. we checked the log analytics workspace logs but and extracted the logs from the caller IP. but could not find much information form it we also checked there was no impact found on our webapp. 1) NMap scanning detected (for this we got the carrier and organization as Microsoft) 2) Vulnerability scanner detected 3) Suspicious User Agent detected Is there any way by which we can investigate why these alerts got generated. and what next action can be taken on this ?2.7KViews0likes1CommentLog Analytics workspace
Hello, can anyone help me understand the workspace used for Defender for Cloud How to identify which workspace is Defender for cloud connected to, older version of Defender for cloud has clear mention of the workspace name to which it is connected, the latest version just displays it as "Default Workspace" not the actual name of the workspace, as there are multiple "Default workspaces" in a subscription/Tenant. Thanks in Adv.1.7KViews1like1CommentSQL Advanced Threat Protection - Requirements Unclear
When configuring Defender for SQL, nothing suggests auditing is required for ATP to work. However, when looking at audit section https://learn.microsoft.com/en-us/azure/azure-sql/database/auditing-overview?view=azuresql#remarks i one of the points says "After you've configured your auditing settings, you can turn on the new threat detection feature... This seems to be a requirement for SQL on Machines, however, is it for Azure SQL workloads? (MI & DB)Solved1.3KViews0likes6CommentsDid I just stumble on a hidden gem?
Hi all, A while back I asked a question on antimalware monitoring, and Noa Kuperberg pointed me to the Antimalware assessment. However, last week I noticed Azure Security Center has the same features as the Antimalware assessment, and it even shows that in the pricing and settings: I see that even the free ASC tier has the ProtectionStatus table in the Log Analytics workspace, so I am indeed able to see the status of the antimalware. Now here comes my confusion: I know that the Azure Security Center "Azure Defender On" paid tier has alerting capabilities on things like brute force attacks, but it seems the free tier has alerting on antimalware (from the IaaSAntimalware extension at least) baked in. I tested this with an eicar test file, and sure enough I am getting alerts. I tested this on several Azure subscriptions that have no Azure Defender subscription, nor trial enabled. I see alerts not only in ASC, but they come to the Activity Log as well, so I can alert from there, even showing me the file path and threat status whether it was quarantined. My question: Is this a happy accident, or is even the free tier supposed to have antimalware alerting from Azure Security Center? Or is that ability going away like after a while, like a secret trialware? P.S. I am well aware that ASC's capabilities extend beyond just antimalware, but this feature alone would be a serious bonus.Solved1.3KViews0likes2Comments