You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-attack-surface-reduction-rules.md
+13-5Lines changed: 13 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,15 +19,17 @@ ms.collection:
19
19
- demo
20
20
ms.topic: article
21
21
ms.subservice: asr
22
-
ms.date: 10/21/2022
22
+
ms.date: 01/15/2024
23
23
---
24
24
25
25
# Attack surface reduction rules demonstrations
26
26
27
27
**Applies to:**
28
28
29
-
-[Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
30
29
-[Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
30
+
-[Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
31
+
-[Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
# EDR detection test for verifying device's onboarding and reporting services
25
26
27
+
#### Applies to:
28
+
29
+
-[Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
30
+
-[Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
31
+
32
+
## Scenario requirements and setup
33
+
34
+
- Windows 11, Windows 10 version 1709 build 16273 or newer, Windows 8.1, or Windows 7 SP1.
35
+
- Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, and Windows Server 2008 R2 SP1.
36
+
- Linux
37
+
- macOS
38
+
- Microsoft Defender for Endpoint
39
+
- Microsoft Defender for Endpoint on Linux
40
+
- Microsoft Defender for Endpoint on macOS
41
+
26
42
Endpoint detection and response for Endpoint provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats.
27
43
28
44
Run an EDR detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
29
45
46
+
### Windows
47
+
48
+
1. Open a Command Prompt window
49
+
50
+
2. At the prompt, copy and run the command below. The Command Prompt window will close automatically.
3. If successful, the detection test will be marked as completed and a new alert will appear in few minutes.
58
+
59
+
### Linux
60
+
61
+
1. Download [script file](https://aka.ms/LinuxDIY) to an onboarded Linux server
62
+
63
+
64
+
```bash
65
+
curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/LinuxDIY
66
+
```
67
+
68
+
1. Extract the zip
69
+
70
+
```bash
71
+
unzip ~/Downloads/MDE Linux DIY.zip
72
+
```
73
+
74
+
1. And run the following command:
75
+
76
+
```bash
77
+
./mde_linux_edr_diy.sh
78
+
```
79
+
80
+
After a few minutes, a detection should be raised in Microsoft Defender XDR.
81
+
82
+
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
83
+
84
+
### macOS
85
+
30
86
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.
31
87
32
88
The following prompt appears:
@@ -45,7 +101,7 @@ Run an EDR detection test to verify that the device is properly onboarded and re
45
101
>
46
102
> > **"MDATP MacOS DIY" cannot be opened because the developer cannot be verifier.**<br/>
47
103
> > macOS cannot verify that this app is free from malware.<br/>
# AV detection test for verifying device's onboarding and reporting services
26
26
27
-
Anti-malware tests are intended to measure how well the anti-malware software is able to detect, block and remove malware in a variety of scenarios. The test also measures the impact of the anti-malware device on the system's performance.
27
+
**Applies to:**
28
28
29
-
Run an AV detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
29
+
-[Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
30
+
31
+
-[Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
32
+
33
+
-[Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
-[Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)
38
+
39
+
Scenario requirements and setup
40
+
41
+
- Windows 11, Windows 10, Windows 8.1, Windows 7 SP1
42
+
43
+
- Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012, and Windows Server 2008 R2
44
+
45
+
- Linux
46
+
47
+
- macOS
48
+
49
+
- Microsoft Defender Real-time protection is enabled
50
+
51
+
## EICAR test file to simulate malware
52
+
53
+
After you enable Microsoft Defender for Endpoint or Microsoft Defender for Business or Microsoft Defender Antivirus, you can test the service and run a proof of concept to familiarize yourself with its feature and validate the advanced security capabilities effectively protect your device by generating real security alerts.
54
+
55
+
Run an AV detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
56
+
57
+
### Windows
58
+
59
+
1. Prepare for the EICAR test file:
60
+
61
+
1. Use an EICAR test file instead of real malware to avoid causing damage. Microsoft Defender Antivirus treats EICAR test files as malware.
62
+
63
+
1. Create the EICAR test file:
64
+
65
+
1. Copy the following string: `X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*`
66
+
67
+
1. Paste the string into a .TXT file and save it as EICAR.txt
68
+
69
+
### Linux/macOS
30
70
31
71
1. Ensure that real-time protection is enabled (denoted by a result of 1 from running the following command):
32
72
33
73
```bash
34
74
mdatp health --field real_time_protection_enabled
35
75
```
36
76
37
-
2. Open a Terminal window. Copy and execute the following command:
77
+
1. Open a Terminal window. Copy and execute the following command:
0 commit comments