Skip to content

Commit

Permalink
Merge pull request #1576 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
Publish main to live, Friday 10:30AM PDT, 10/11
  • Loading branch information
Stacyrch140 authored Oct 11, 2024
2 parents 6216997 + 24da870 commit d665e9d
Show file tree
Hide file tree
Showing 30 changed files with 230 additions and 233 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ ms.collection:
- demo
ms.topic: article
ms.subservice: asr
ms.date: 02/16/2024
ms.date: 10/11/2024
---

# Controlled folder access (CFA) demonstrations (block ransomware)
Expand Down Expand Up @@ -44,10 +44,10 @@ Set-MpPreference -ControlledFolderAccessProtectedFolders C:\demo\
## Rule states

|State | Mode| Numeric value |
|:---|:---|:---|
| Disabled | = Off | 0 |
| Enabled | = Block mode | 1 |
| Audit | = Audit mode | 2 |
|---|---|---|
| Disabled | Off | 0 |
| Enabled | Block mode | 1 |
| Audit | Audit mode | 2 |

## Verify configuration

Expand All @@ -63,65 +63,86 @@ Get-MpPreference

### Setup

Download and run this [setup script](https://demo.wd.microsoft.com/Content/CFA_SetupScript.zip). Before running the script set execution policy to Unrestricted using this PowerShell command:
Download and run this [setup script](https://demo.wd.microsoft.com/Content/CFA_SetupScript.zip). Before running the script, set execution policy to `Unrestricted` by using this PowerShell command:

```powershell
Set-ExecutionPolicy Unrestricted
```

You can perform these manual steps instead:
Or, you can perform these manual steps instead:

1. Create a folder under c: named demo, "c:\demo".
1. Create a folder under `c:` named `demo`, as in `c:\demo`.

2. Save this [clean file](https://demo.wd.microsoft.com/Content/testfile_safe.txt) into c:\demo (we need something to encrypt).
2. Save this [clean file](https://demo.wd.microsoft.com/Content/testfile_safe.txt) into `c:\demo` (we need something to encrypt).

3. Execute PowerShell commands listed earlier in this article.
3. Run the PowerShell commands listed earlier in this article.

Next, check that status of the *Aggressive Ransomware Prevention* ASR rule and disable it for the duration of this test if it's enabled:

### Scenario 1: CFA blocks ransomware test file

1. Turn on CFA using PowerShell command:

```powershell
Set-MpPreference -EnableControlledFolderAccess Enabled
$idx = $(Get-MpPreference).AttackSurfaceReductionRules_Ids.IndexOf("C1DB55AB-C21A-4637-BB3F-A12568109D35")
if ($idx -ge 0) {Write-Host "Rule Status: " $(Get-MpPreference).AttackSurfaceReductionRules_Actions[$idx]} else {Write-Host "Rule does not exist on this machine"}
```

2. Add the demo folder to protected folders list using PowerShell command:
If the rule exists and the status is `1 (Enabled)` or `6 (Warn)`, it must be disabled to run this test:

```powershell
Set-MpPreference -ControlledFolderAccessProtectedFolders C:\demo\
Add-MpPreference -AttackSurfaceReductionRules_Ids C1DB55AB-C21A-4637-BB3F-A12568109D35 -AttackSurfaceReductionRules_Actions Disabled
```

3. Download the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe)
4. Execute the ransomware test file *this isn't ransomware, it simple tries to encrypt c:\demo
### Scenario 1: CFA blocks ransomware test file

1. Turn on CFA using PowerShell command:

```powershell
Set-MpPreference -EnableControlledFolderAccess Enabled
```

2. Add the demo folder to protected folders list using PowerShell command:

```powershell
Set-MpPreference -ControlledFolderAccessProtectedFolders C:\demo\
```

3. Download the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe).

4. Execute the ransomware test file. Note that it isn't ransomware; it simply tries to encrypt `c:\demo`.

#### Scenario 1 expected results

5 seconds after executing the ransomware test file you should see a notification CFA blocked the encryption attempt.
About five seconds after executing the ransomware test file, you should see a notification that CFA blocked the encryption attempt.

### Scenario 2: What would happen without CFA

1. Turn off CFA using this PowerShell command:

```powershell
Set-MpPreference -EnableControlledFolderAccess Disabled
```
```powershell
Set-MpPreference -EnableControlledFolderAccess Disabled
```

2. Execute the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe)
2. Execute the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe).

#### Scenario 2 expected results

- The files in c:\demo are encrypted and you should get a warning message
- The files in `c:\demo` are encrypted and you should get a warning message
- Execute the ransomware test file again to decrypt the files

## Clean-up

Download and run this [cleanup script](https://demo.wd.microsoft.com/Content/ASR_CFA_CleanupScript.zip). You can perform these manual steps instead:
1. Download and run this [cleanup script](https://demo.wd.microsoft.com/Content/ASR_CFA_CleanupScript.zip). You can perform these manual steps instead:

```powershell
Set-MpPreference -EnableControlledFolderAccess Disabled
```
```powershell
Set-MpPreference -EnableControlledFolderAccess Disabled
```

2. Clean up `c:\demo` encryption by using the [encrypt/decrypt file](https://demo.wd.microsoft.com/Content/ransomware_cleanup_encrypt_decrypt.exe)

3. If the *Aggressive Ransomware Prevention* ASR rule was enabled and you disabled it at the beginning of this test, enable it again:

Clean up c:\demo encryption by using the [encrypt/decrypt file](https://demo.wd.microsoft.com/Content/ransomware_cleanup_encrypt_decrypt.exe)
```powershell
Add-MpPreference -AttackSurfaceReductionRules_Ids C1DB55AB-C21A-4637-BB3F-A12568109D35 -AttackSurfaceReductionRules_Actions Enabled
```

## See also

Expand Down
4 changes: 2 additions & 2 deletions defender-endpoint/device-control-policies.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ description: Learn about Device control policies in Defender for Endpoint
author: denisebmsft
ms.author: deniseb
manager: deniseb
ms.date: 09/18/2024
ms.date: 10/11/2024
ms.topic: overview
ms.service: defender-endpoint
ms.subservice: asr
Expand Down Expand Up @@ -136,7 +136,7 @@ The following code snippet shows the syntax for a device control policy rule in
</IncludedIdList>
<ExcludedIdList>
<GroupId>{3f5253e4-0e73-4587-bb9e-bb29a2171695}</GroupId>
<ExcludedIdList>
</ExcludedIdList>
<Entry Id="{e3837e60-5e56-43ce-8095-043ccd793eac}">
...
</Entry>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,15 +15,15 @@ ms.collection:
ms.topic: conceptual
ms.subservice: linux
search.appverid: met150
ms.date: 05/01/2024
ms.date: 10/11/2024
---

# Deploy Defender for Endpoint on Linux with Chef

**Applies to:**

- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
- Microsoft Defender for Servers
- Microsoft Defender XDR

[!INCLUDE [Microsoft Defender for Endpoint third-party tool support](../includes/support.md)]

Expand Down
9 changes: 4 additions & 5 deletions defender-endpoint/linux-exclusions.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ ms.collection:
ms.topic: conceptual
ms.subservice: linux
search.appverid: met150
ms.date: 07/31/2024
ms.date: 10/11/2024
---

# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
Expand All @@ -24,9 +24,8 @@ ms.date: 07/31/2024

**Applies to:**

- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
- [Microsoft Defender XDR](/defender-xdr)
- Microsoft Defender for Servers
- Microsoft Defender XDR

> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
Expand Down Expand Up @@ -141,7 +140,7 @@ For more information, see [Set preferences for Defender for Endpoint on Linux](l
Run the following command to see the available switches for managing exclusions:

> [!NOTE]
> `--scope` is an optional flag with accepted value as `epp` or `global`. It provides the same scope used while adding the exclusion to remove the same exclusion. In the command line approach, if the scope isnt mentioned, the scope value is set as `epp`.
> `--scope` is an optional flag with accepted value as `epp` or `global`. It provides the same scope used while adding the exclusion to remove the same exclusion. In the command line approach, if the scope isn't mentioned, the scope value is set as `epp`.
> Exclusions added through CLI before the introduction of `--scope` flag remain unaffected and their scope is considered `epp`.
```bash
Expand Down
7 changes: 3 additions & 4 deletions defender-endpoint/linux-install-manually.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ ms.collection:
ms.topic: conceptual
ms.subservice: linux
search.appverid: met150
ms.date: 08/01/2024
ms.date: 10/11/2024
---

# Deploy Microsoft Defender for Endpoint on Linux manually
Expand All @@ -24,9 +24,8 @@ ms.date: 08/01/2024

**Applies to:**

- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
- [Microsoft Defender XDR](/defender-xdr)
- Microsoft Defender for Servers
- Microsoft Defender XDR

> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
Expand Down
7 changes: 3 additions & 4 deletions defender-endpoint/linux-install-with-ansible.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ ms.collection:
ms.topic: conceptual
ms.subservice: linux
search.appverid: met150
ms.date: 09/19/2024
ms.date: 10/11/2024
---

# Deploy Microsoft Defender for Endpoint on Linux with Ansible
Expand All @@ -24,9 +24,8 @@ ms.date: 09/19/2024

**Applies to:**

- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
- [Microsoft Defender XDR](/defender-xdr)
- Microsoft Defender for Servers
- Microsoft Defender XDR

> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
Expand Down
7 changes: 3 additions & 4 deletions defender-endpoint/linux-install-with-puppet.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ ms.collection:
ms.topic: conceptual
ms.subservice: linux
search.appverid: met150
ms.date: 07/15/2024
ms.date: 10/11/2024
---

# Deploy Microsoft Defender for Endpoint on Linux with Puppet
Expand All @@ -25,9 +25,8 @@ ms.date: 07/15/2024

**Applies to:**

- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
- [Microsoft Defender XDR](/defender-xdr)
- Microsoft Defender for Servers
- Microsoft Defender XDR

> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
Expand Down
7 changes: 3 additions & 4 deletions defender-endpoint/linux-install-with-saltack.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ ms.collection:
ms.topic: conceptual
ms.subservice: linux
search.appverid: met150
ms.date: 07/15/2024
ms.date: 10/11/2024
---

# Deploy Microsoft Defender for Endpoint on Linux with Saltstack
Expand All @@ -24,9 +24,8 @@ ms.date: 07/15/2024

**Applies to:**

- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
- [Microsoft Defender XDR](/defender-xdr)
- Microsoft Defender for Servers
- Microsoft Defender XDR

> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
Expand Down
7 changes: 3 additions & 4 deletions defender-endpoint/linux-preferences.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ ms.service: defender-endpoint
ms.author: deniseb
author: denisebmsft
ms.localizationpriority: medium
ms.date: 08/28/2024
ms.date: 10/11/2024
manager: deniseb
audience: ITPro
ms.collection:
Expand All @@ -25,9 +25,8 @@ search.appverid: met150

**Applies to:**

- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
- [Microsoft Defender XDR](/defender-xdr)
- Microsoft Defender for Servers
- Microsoft Defender XDR

> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
Expand Down
7 changes: 3 additions & 4 deletions defender-endpoint/linux-privacy.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ ms.collection:
ms.topic: conceptual
ms.subservice: linux
search.appverid: met150
ms.date: 05/01/2024
ms.date: 10/11/2024
---

# Privacy for Microsoft Defender for Endpoint on Linux
Expand All @@ -24,9 +24,8 @@ ms.date: 05/01/2024

**Applies to:**

- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
- [Microsoft Defender XDR](/defender-xdr)
- Microsoft Defender for Servers
- Microsoft Defender XDR

> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
Expand Down
7 changes: 3 additions & 4 deletions defender-endpoint/linux-pua.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ ms.collection:
ms.topic: conceptual
ms.subservice: linux
search.appverid: met150
ms.date: 05/01/2024
ms.date: 10/11/2024
---

# Detect and block potentially unwanted applications with Microsoft Defender for Endpoint on Linux
Expand All @@ -25,9 +25,8 @@ ms.date: 05/01/2024

**Applies to:**

- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
- [Microsoft Defender XDR](/defender-xdr)
- Microsoft Defender for Servers
- Microsoft Defender XDR

> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
Expand Down
7 changes: 3 additions & 4 deletions defender-endpoint/linux-resources.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ ms.collection:
ms.topic: conceptual
ms.subservice: linux
search.appverid: met150
ms.date: 10/03/2024
ms.date: 10/11/2024
---

# Resources
Expand All @@ -25,9 +25,8 @@ ms.date: 10/03/2024

**Applies to:**

- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
- [Microsoft Defender XDR](/defender-xdr)
- Microsoft Defender for Servers
- Microsoft Defender XDR

> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
Expand Down
7 changes: 3 additions & 4 deletions defender-endpoint/linux-schedule-scan-mde.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,16 +15,15 @@ ms.collection:
ms.topic: conceptual
ms.subservice: linux
search.appverid: met150
ms.date: 05/01/2024
ms.date: 10/11/2024
---

# Schedule scans with Microsoft Defender for Endpoint (Linux)

**Applies to:**

- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)

- Microsoft Defender for Servers
- Microsoft Defender XDR

To run a scan for Linux, see [Supported Commands](linux-resources.md#supported-commands).

Expand Down
Loading

0 comments on commit d665e9d

Please sign in to comment.