Microsoft Defender for Endpoint Security Technical Implementation Guide

Overview

VersionDateFinding Count (25)Downloads
V1R22025-11-25CAT I (High): 1CAT II (Medium): 24CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC III - Administrative Sensitive

Finding IDSeverityTitleDescription
V-272882
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must alert administrators on policy violations defined for endpoints.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-272886
LOWMEDIUMHIGH
Roles for use with Microsoft Defender for Endpoint (MDE) must be configured within Entra ID.Application management functionality includes functions necessary for administration and requires privileged user access. Allowing nonprivileged users...
V-272887
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must be configured for a least privilege model by implementing Unified Role-Based Access Control (RBAC).When first accessing the Microsoft Defender portal, either full access or read only access is granted. Full access rights are granted to users with th...
V-272888
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Endpoint Detection and Response (EDR) in block mode.Denial of service (DoS) is a condition in which a resource is not available for legitimate users. When this occurs, the organization either cannot acc...
V-275979
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Automatically Resolve Alerts.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275980
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Allow or block file.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275981
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Hide potential duplicate device records.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275982
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Custom network indicators.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275983
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Tamper protection.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275984
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Show user details.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275985
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Microsoft Defender for Cloud Apps.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275986
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Web content filtering.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275987
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Device discovery.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275988
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Download quarantined files.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275989
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Live Response.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275990
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Live Response for Servers.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275991
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Share endpoint alerts with Microsoft Compliance Center.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275992
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Microsoft Intune connection.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275993
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Authenticated telemetry.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275994
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable File Content Analysis.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275995
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Memory Content Analysis.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275996
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) Discovery Mode must enable Log4j2 detection.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275997
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) Discovery Mode must be set to All Devices.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-275998
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must enable Full remediation for Device groups.Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact ...
V-272889
LOWMEDIUMHIGH
Microsoft Defender for Endpoint (MDE) must be connected to a central log server.Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information s...