{"id":423,"date":"2024-03-23T03:41:12","date_gmt":"2024-03-23T03:41:12","guid":{"rendered":"https:\/\/hackmybox.com\/?p=423"},"modified":"2024-08-15T06:50:38","modified_gmt":"2024-08-15T06:50:38","slug":"microsoft-defender-for-endpoint-part-2","status":"publish","type":"post","link":"https:\/\/hackmybox.com\/index.php\/2024\/03\/23\/microsoft-defender-for-endpoint-part-2\/","title":{"rendered":"Microsoft Defender For Endpoint Part 2"},"content":{"rendered":"\n<p><strong>Vulnerability Discovery and Remediation with Microsoft Defender &amp; Intune<\/strong><\/p>\n\n\n\n<p>Overview: Last time, we installed Microsoft Defender, identified vulnerabilities, and viewed recommended actions. This post will show you how to remediate potential risks using Intune.<\/p>\n\n\n\n<p><br>1. In Microsoft Defender, navigate to Devices -&gt; Device Inventory. Click on the target device.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1043\" height=\"389\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-38.png\" alt=\"\" class=\"wp-image-424\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-38.png 1043w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-38-300x112.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-38-1024x382.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-38-768x286.png 768w\" sizes=\"auto, (max-width: 1043px) 100vw, 1043px\" \/><\/figure>\n\n\n\n<p>2. &nbsp;From the device&#8217;s Security Recommendations, select &#8220;Disable Password Manager.&#8221; On the right pane, it will show the description, potential risks, and related threats.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"472\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-40-1024x472.png\" alt=\"\" class=\"wp-image-427\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-40-1024x472.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-40-300x138.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-40-768x354.png 768w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-40.png 1495w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"503\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-41.png\" alt=\"\" class=\"wp-image-428\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-41.png 700w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-41-300x216.png 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure>\n\n\n\n<p>3. Click on &#8220;Remediation options&#8221; and then click on &#8220;Request remediation&#8221; to track the activity.<\/p>\n\n\n\n<p><em>(<\/em><em>Request remediation is useful for large IT groups, especially if you have separate teams managing vulnerabilities)<\/em><\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"510\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-42-1024x510.png\" alt=\"\" class=\"wp-image-429\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-42-1024x510.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-42-300x149.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-42-768x383.png 768w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-42-1536x765.png 1536w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-42.png 1574w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>4. In the Microsoft Intune Admin Center, navigate to &#8220;Scripts and Remediations then click \u201cCreate\u201d<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"955\" height=\"666\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-43.png\" alt=\"\" class=\"wp-image-430\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-43.png 955w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-43-300x209.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-43-768x536.png 768w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-43-825x575.png 825w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-43-590x410.png 590w\" sizes=\"auto, (max-width: 955px) 100vw, 955px\" \/><\/figure>\n\n\n\n<p>5. Enter the Basic information as seen below.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"873\" height=\"788\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-44.png\" alt=\"\" class=\"wp-image-431\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-44.png 873w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-44-300x271.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-44-768x693.png 768w\" sizes=\"auto, (max-width: 873px) 100vw, 873px\" \/><\/figure>\n\n\n\n<p>6. For the detection script file named CheckChrome.ps1, it checks if the device is compliant. Return 0 if the device is compliant; otherwise, return 1, triggering the Remediation script for implementation.<\/p>\n\n\n\n<p>For more information see Microsoft article: https:\/\/learn.microsoft.com\/en-us\/mem\/intune\/fundamentals\/remediations<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"889\" height=\"617\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-45.png\" alt=\"\" class=\"wp-image-432\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-45.png 889w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-45-300x208.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-45-768x533.png 768w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-45-590x410.png 590w\" sizes=\"auto, (max-width: 889px) 100vw, 889px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>7. For testing purposes only, assign it to all devices.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"762\" height=\"801\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-46.png\" alt=\"\" class=\"wp-image-433\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-46.png 762w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-46-285x300.png 285w\" sizes=\"auto, (max-width: 762px) 100vw, 762px\" \/><\/figure>\n\n\n\n<p>8. Click create<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"781\" height=\"678\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-47.png\" alt=\"\" class=\"wp-image-434\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-47.png 781w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-47-300x260.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-47-768x667.png 768w\" sizes=\"auto, (max-width: 781px) 100vw, 781px\" \/><\/figure>\n\n\n\n<p>9. See below registry before running the remediation script.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"791\" height=\"515\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-48.png\" alt=\"\" class=\"wp-image-435\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-48.png 791w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-48-300x195.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-48-768x500.png 768w\" sizes=\"auto, (max-width: 791px) 100vw, 791px\" \/><\/figure>\n\n\n\n<p>9. Finally go to Device and &#8220;Run Remediation&#8221;.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"311\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-49-1024x311.png\" alt=\"\" class=\"wp-image-436\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-49-1024x311.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-49-300x91.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-49-768x233.png 768w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-49.png 1236w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>9. Notice &#8216;Run remediation completed&#8217; if successful.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"346\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-50-1024x346.png\" alt=\"\" class=\"wp-image-437\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-50-1024x346.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-50-300x101.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-50-768x260.png 768w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-50.png 1228w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>10. Check registry changes after running remediation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"707\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-51-1024x707.png\" alt=\"\" class=\"wp-image-438\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-51-1024x707.png 1024w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-51-300x207.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-51-768x530.png 768w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-51.png 1162w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>11. Open Chrome; the option to save passwords is now disabled.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1022\" height=\"465\" src=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-52.png\" alt=\"\" class=\"wp-image-439\" srcset=\"https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-52.png 1022w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-52-300x136.png 300w, https:\/\/hackmybox.com\/wp-content\/uploads\/2024\/03\/image-52-768x349.png 768w\" sizes=\"auto, (max-width: 1022px) 100vw, 1022px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Discovery and Remediation with Microsoft Defender &amp; Intune Overview: Last time, we installed Microsoft Defender, identified vulnerabilities, and viewed recommended actions. This post will show you how to remediate potential risks using Intune. 1. In Microsoft Defender, navigate to Devices -&gt; Device Inventory. Click on the target device. 2. &nbsp;From the device&#8217;s Security Recommendations, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":784,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","site-transparent-header":"default","prose-style":"enable","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[12],"tags":[],"class_list":["post-423","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/comments?post=423"}],"version-history":[{"count":5,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/423\/revisions"}],"predecessor-version":[{"id":785,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/posts\/423\/revisions\/785"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/media\/784"}],"wp:attachment":[{"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/media?parent=423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/categories?post=423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackmybox.com\/index.php\/wp-json\/wp\/v2\/tags?post=423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}