User Profile
Jonhed
Iron Contributor
Joined 5 years ago
I work primarily with design and implementation of MDE and Sentinel.
User Widgets
Recent Discussions
Re: How to get Sharepoint online into Conditional Access app Control
gutharius Sharepoint online should be automatically onboarded if you just create a conditional access policy that covers it, as mentioned in the docs below. https://learn.microsoft.com/en-us/defender-cloud-apps/session-policy-aad#sample-create-microsoft-entra-id-conditional-access-policies-for-use-with-defender-for-cloud-apps Also introduced here. https://youtu.be/L-EKqbse2cs?si=L0me1sc0txMoHU5d&t=257701Views0likes0CommentsRe: Defender for Server without Internet access
Sankaperera Defender Antivirus Without internet access you can use Defender Antivirus, which is a traditional Antivirus solution available on windows servers 2016 and up. (note, the antivirus in 2016 does not have all the functionality that is available 2019 and up. You have the option of distributing updates via a share folder, WSUS or MEC, which will not require direct internet access from the protected servers. Defender Antivirus is integrated in the OS so it does not require Defender for Servers licensing. Defender for Endpoint(Defender for Servers) The EDR solution Defender for Endpoint runs all analytics in the cloud, and will require internet access, either direct or through a proxy.2.8KViews0likes0CommentsRe: MDE-Management
Fhilp So these servers.. a. are not domain controllers b. they have the may-2023 update of the EDR package https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/windows-whatsnew?view=o365-worldwide#may-2023-release-version-108295226211023 c. they are not running core editions d. do not have the PowerShell restrict mode configured as below https://learn.microsoft.com/en-us/mem/intune/protect/mde-security-integration?pivots=mdssc-preview is this correct?2.6KViews0likes1CommentRe: Windefender AV Signature Updates Cannot be Scheduled
there are some additional settings regarding updates, such as updating before a scheduled scan or update on startup and so forth. https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/manage-event-based-updates-microsoft-defender-antivirus?view=o365-worldwide I suppose these could be the reason for the out of band updates. The ad-hoc updates listed happen dynamically when deemed necessary by cloud protection, but this will not affect the signature version. So assuming you mean the signature version goes up, the ad-hoc updates are not related. Other than that regular OS windows update checks will download signatures as well, in case those run regularly.1.4KViews0likes0CommentsRe: role needed to view devices inventory in Defender
glujan72 Actually, if you do not have the RBAC enabled, my understanding is that reader roles should work. Though, after having an additional look at the docs below, security reader might be the only role that works. https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/basic-permissions?view=o365-worldwide You mentioned giving global reader, so maybe try to assign security reader as well? If this does not work, I would raise an SR with microsoft to check if RBAC (or the lack of) can be the reason.10KViews1like0CommentsRe: role needed to view devices inventory in Defender
Are you using the MDE RBAC in your environment? If so, read-only roles are no longer valid for MDE, so you will need to give him a role in MDE as well. https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/rbac?view=o365-worldwide Also check if device groups have security groups assigned for user access. If a device group has a security groups assigned, only users that are part of these security groups will be able to see those devices.14KViews2likes2CommentsRe: KQL query
akshay250692 My bad, was missing a bit. let threshold=1; let authenticationWindow = 5m; let Logs = SigninLogs | where UserPrincipalName == "email address removed for privacy reasons" | where ResultDescription has_any ("Invalid username or password", "Invalid on-premise username or password"); Logs | summarize StartTimeUtc = min(TimeGenerated), EndTimeUtc = max(TimeGenerated) by bin(TimeGenerated, authenticationWindow), UserPrincipalName, ResultDescription, AppDisplayName | join kind=inner ( Logs | summarize FailedAttempt = count() by ResultDescription, UserPrincipalName, AppDisplayName | where FailedAttempt >= ["threshold"] ) on UserPrincipalName,AppDisplayName,ResultDescription | project-away UserPrincipalName1,AppDisplayName1,ResultDescription11.2KViews0likes3CommentsRe: Is there a problem when installing the MDE agent on a VM without public IP?
If you can access all the required URLS it is fine. If you do not have any access to the internet at all, you cannot use MDE. Onboarding to MDE means registering the VM to the MDE cloud platform, and all the EDR functionality lies in the cloud, so it requires internet access. Logs are streamed from the VM to the cloud, and are analyzed in the cloud. We are talking about the MDE as an EDR, right? Or is this about Defender Antivirus?14KViews1like3CommentsRe: KQL query
akshay250692 | summarize FailedAttempt = count() by ResultDescription, UserPrincipalName, AppDisplayName The summarize above does not contain TimeGenerated, so the TimeGenerated field is removed from the results past that. Therefore, you cannot use it at the final line. Try the code below. let threshold=1; let authenticationWindow = 5m; let Logs = SigninLogs | where UserPrincipalName == "email address removed for privacy reasons" | where ResultDescription has_any ("Invalid username or password", "Invalid on-premise username or password"); Logs | summarize StartTimeUtc = min(TimeGenerated), EndTimeUtc = max(TimeGenerated) by bin(TimeGenerated, authenticationWindow), UserPrincipalName, AppDisplayName | join kind=inner ( Logs | summarize FailedAttempt = count() by ResultDescription, UserPrincipalName, AppDisplayName | where FailedAttempt >= ["threshold"] ) on UserPrincipalName,AppDisplayName,ResultDescription | project-away UserPrincipalName1,AppDisplayName1,ResultDescription11.1KViews0likes5CommentsRe: Weekely Vulnerability report for servers
You can use logic apps to do this. Cannot remember if the DeviceTvmSoftwareVulnerabilitiesKB is available in the regular MDE advanced hunting connector, but if it is not you can access the microsoft 365 defender rest API to run queries there. Results can be made into a csv file etc, and then mailed via outlook, sendgrid or some other mail solution available in the logic apps.1.8KViews0likes1CommentRe: Updating the MDE.Windows extension
>When deleting the MDE.Windows/MDE.Linux extension, there is no impact to the Sensor software on the server The point about deletion not having any effect on the sensor is covered below, but yes I do agree the relation between the extension and the MDE software in general is not covered much. https://learn.microsoft.com/en-us/azure/defender-for-cloud/integration-defender-for-endpoint >If integration with Microsoft Defender for Endpoint is enabled, and the extension is deleted, it will be promptly installed again. If you check that box for MDE integration, this is indeed true. The defender for servers plan will charge you for any server present anyways though. Onboarding scope can be managed with Azure Policy if you uncheck that box, but you would still be charged. Hoping to see some scoping for the actual Defender for Servers plan some time.12KViews0likes0CommentsRe: Updating the MDE.Windows extension
I am not quite sure if updating the MDE.windows extension itself actually has any use, since it only deploys MDE and does nothing past that. As far as I know, any integration between MDE and defender for cloud past that happens through the APIs directly between the services, rather than through the extension.12KViews1like2CommentsRe: Updating the MDE.Windows extension
Yes, the extension is pretty much there just to push the MDE onboarding package to the server. Past that, it is just a regular MDE and MDAV installation. Pattern updates, engine updates as well as platform updates are managed by MDAV. https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/manage-protection-updates-microsoft-defender-antivirus?view=o365-worldwide As for MDE itself, it depends on the version. Windows Server 2019 and above come with the MDE sensor integrated in the OS, so MDE sensor updates are included in the OS security updates. Windows 2012 R2 and 2016 get the MDE sensor through a separate installation (MDE unified package), and requires updates via Windows Update, WSUS etc. https://support.microsoft.com/en-us/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac14KViews2likes4CommentsRe: Unable to apply ASR rules for Windows servers (2012R2,2016, 2019 and 2022) via SCCM
this appears to be a known problem with no known fix. https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/enable-attack-surface-reduction?view=o365-worldwide#microsoft-configuration-manager49KViews0likes1CommentRe: Microsoft Defender for Server- Endpoint Protection Disable
There is reporting available for virus definition files in Microsoft 365 Defender. As for update sources, the default will be Microsoft Update, however there are options there, and using Microsoft Update requires the Windows Update service to run etc so may not be available in all environments depending on the OS configuration. https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/manage-protection-updates-microsoft-defender-antivirus?view=o365-worldwide3.1KViews0likes2Comments
Recent Blog Articles
No content to show