Skip to content

Commit 834ae48

Browse files
Merge pull request #21265 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/microsoft-365-docs (branch public)
2 parents d990d36 + abf13cf commit 834ae48

1 file changed

Lines changed: 20 additions & 2 deletions

File tree

microsoft-365/security/defender-endpoint/tamper-resiliency.md

Lines changed: 20 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: dansimp
77
ms.reviewer: joshbregman
88
ms.service: microsoft-365-security
99
ms.subservice: mde
10-
ms.date: 06/01/2023
10+
ms.date: 07/04/2023
1111
ms.topic: overview
1212
ms.collection:
1313
- tier1
@@ -104,11 +104,29 @@ Attackers can be preventing from discovering existing antivirus exclusions by en
104104

105105
When tampering is detected, an alert is raised. Some of the alert titles for tampering are:
106106

107+
- Attempt to bypass Microsoft Defender for Endpoint client protection
108+
- Attempt to stop Microsoft Defender for Endpoint sensor
109+
- Attempt to tamper with Microsoft Defender on multiple devices
110+
- Attempt to turn off Microsoft Defender Antivirus protection
111+
- Defender detection bypass
112+
- Driver-based tampering attempt blocked
113+
- Image file execution options set for tampering purposes
114+
- Microsoft Defender Antivirus protection turned off
115+
- Microsoft Defender Antivirus tampering
116+
- Modification attempt in Microsoft Defender Antivirus exclusion list
117+
- Pending file operations mechanism abused for tampering purposes
107118
- Possible Antimalware Scan Interface (AMSI) tampering
119+
- Possible remote tampering
120+
- Possible sensor tampering in memory
108121
- Potential attempt to tamper with MDE via drivers
122+
- Security software tampering
123+
- Suspicious Microsoft Defender Antivirus exclusion
109124
- Tamper protection bypass
125+
- Tampering activity typical to ransomware attacks
126+
- Tampering with Microsoft Defender for Endpoint sensor communication
127+
- Tampering with Microsoft Defender for Endpoint sensor settings
110128
- Tampering with the Microsoft Defender for Endpoint sensor
111-
- Possible tampering with protected processes
129+
112130

113131
If the [Block abuse of exploited vulnerable signed drivers](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference#block-abuse-of-exploited-vulnerable-signed-drivers) attack surface reduction (ASR) rule is triggered, the event is viewable in the [ASR Report](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-report) and in [Advanced Hunting](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-operationalize#asr-rules-advanced-hunting)
114132

0 commit comments

Comments
 (0)