Exception Handling for Defender & Third-Party EDR Conflict

용현 정 20 Reputation points
2024-05-12T23:46:36.76+00:00

Hello.

We are currently operating Microsoft Defender for Cloud (MDC). We aim to comply with one of MDC's recommendations, 'EDR solution should be installed on Virtual Machines.' While Windows machines have Microsoft Defender for Endpoint (MDE) installed as an extension and are recognized as normal resources, Linux machines utilize a third-party antivirus solution, Crowdstrike. However, MDC fails to recognize this and marks them as abnormal resources. Upon reviewing relevant MS Docs, it seems this might be due to the following reasons. With this in mind, we have the following two questions:User's image

Q1. How should we handle resources marked as abnormal under the recommendation 'EDR solution should be installed on Virtual Machines' (utilizing a third-party Crowdstrike antivirus) as there is no mention of exception handling in the recommendation? Is there a way to transition such resources to normal status or proceed with exception handling?

thumbnail image 1 of blog post titled  Inquiry Regarding Exception Handling for Defender for Cloud and Third-Party EDR Conflict

Q2. MDE.Linux was deployed as an extension to Linux machines with Crowdstrike antivirus installed, but deployment failed (confirmed due to conflicts with falcon-sensor). Will redeployment occur if the extension is removed? Alternatively, in case of deployment failure for MDE extension, is a separate MDE offboarding process required? Currently, we are using Plan2 with MDE integration, as shown in the image below.

User's image

Thank you.

Microsoft Defender for Cloud
Microsoft Defender for Cloud
An Azure service that provides threat protection for workloads running in Azure, on-premises, and in other clouds. Previously known as Azure Security Center and Azure Defender.
1,214 questions
Microsoft Defender for Endpoint Training
Microsoft Defender for Endpoint Training
Microsoft Defender for Endpoint: A Microsoft unified security platform for preventative protection, postbreach detection, and automated investigation and response. Previously known as Microsoft Defender Advanced Threat Protection.Training: Instruction to develop new skills.
18 questions
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Pauline Mbabu 15 Reputation points Microsoft Employee
    2024-05-14T09:39:38.43+00:00

    Hello 용현 정,
    Regarding your first question on Exemptions, please find the link below on how to exempt resources from recommendations. https://learn.microsoft.com/en-us/azure/defender-for-cloud/exempt-resource Regarding the second question, you can try removing the MDE extension and then redeploying it, ensure that you first address the conflict with falcon sensor.


  2. Akshay-MSFT 16,436 Reputation points Microsoft Employee
    2024-05-23T13:26:56.4733333+00:00

    @용현 정

    Thank you for your time and patience, kindly follow the action plan suggested below and let me know if this don't work out.

    Regarding Q1, as I mentioned in my question, the recommendation 'EDR solution should be installed on Virtual Machines' does not show an option to exempt resources. Therefore, we are unable to perform the exemption method referenced in the provided link. Could you please provide guidance on alternative methods for handling exceptions?

    The EDR recommendation is enabled when you have agentless scanning for virtual machines enabled.

    Defender for Cloud has the ability to tell you if you have a supported endpoint detection and response solution enabled on your virtual machines (VM) and which one it is.

    I am not sure why it is not giving you option to exempt the VM as If an EDR solution is installed but not discoverable by this recommendation, it can be exempted.

    So, my recommendation here is to install Crowdstrike (falcon-sensor) as an extension and disable "Endpoint Protection" from the server plan. Once done then wait for 24 hours to validate any changes.

    If this does not solve the issue, then share the screenshot of the EDR solution recommendation by choosing the resource from "Inventory" > Under recommendation select "'EDR solution should be installed on Virtual Machines" .

    Q2, your response suggested resolving the conflict with the falcon-sensor. However, in our environment, we must use Crowdstrike (falcon-sensor) antivirus on our Linux systems instead of MDE. Therefore, we cannot remove the falcon-sensor and need to ensure that MDE is not deployed. My question was whether removing MDE.Linux from the extension will prevent MDE from being reinstalled.

    Defender for Cloud discovers a supported endpoint detection and response solution on your VM, the agentless machine scanner performs the following checks to see:

    • If a supported endpoint detection and response solution is enabled
    • If Defender for Servers plan 2 is enabled on your subscription and the associated VMs
    • If the supported solution is installed successfully

    CrowdStrike (Falcon) is a supported endpoint detection and response solution

    You could install Crowdstrike (falcon-sensor) as an extension in the VM.

    To remove the Defender for Endpoint solution from your machines:

    1. Disable the integration:
      1. From Defender for Cloud's menu, select Environment settings and select the subscription with the relevant machines.
      2. In the Defender plans page, select Settings & Monitoring.
      3. In the status of the Endpoint protection component, select Off to disable the integration with Microsoft Defender for Endpoint. (Else it would retry to push the agent if unified agent is installed)
      4. Select Continue and Save to save your settings.
    2. Remove the MDE.Windows/MDE.Linux extension from the machine.
    3. Follow the steps in Offboard devices from the Microsoft Defender for Endpoint service from the Defender for Endpoint documentation.

    Please "Accept the answer (Yes)" and "share your feedback ". This will help us and others in the community as well.

    Thanks,

    Akshay Kaushik

    0 comments No comments