Ideas
What features would you like to see?
All of the feedback that you share in these forums will be monitored and reviewed by the Microsoft engineering teams responsible for building Microsoft Endpoint Configuration Manager, though we can’t promise to reply to all posts.
If you require assisted support, please see https://aka.ms/cmcbsupport for more details.
-
Windows Defender was performing 2 WMI queries through SCCM every minute
Microsoft Case ID: [Case #:24522893] - TrackingID#120121125002133.
While troubleshooting on the case we noticed that Windows Defender was performing 2 WMI queries through SCCM every minute, even when Defender was disabled on the system. These queries generate about 70.000 events (detected via procmon) related to the registry every minute.
The cause of the query is ccmexec.exe
The queries are (detected via procdump):
select * from _instancecreationevent within 60 where targetinstance isa "win32service" and ( targetinstance.name="msmpsvc" or targetinstance.name="windefend")select * from _instancemodificationevent within 60 where targetinstance isa "win32service" and targetinstance.state="running" and ( targetinstance.name="msmpsvc" or targetinstance.name="windefend")
Antivirus scans those actions…
21 votes -
Include the MBAM Administration Service in CM's BitLocker Management
The one component from MBAM which has not so far been included in CM BitLocker Management is the Administration Service. This web service is used as the api entry point for 3rd party systems and custom automation activities for things like retrieving recovery keys.
13 votes -
Provide Support for BitLocker Management with IBCM
Currently, internet-based clients are able to receive BitLocker Management Policies via IBCM but are unable to contact the Recovery Service. I have found that this is due to the MBAM Agent looking for the CurrentManagementPoint in WMI at ROOT\ccm:SMS_Authority.Name="SMS:<SiteCode>".
It is possible to trick” the MBAM Agent into using the internet-based MP by adding the IBCM FQDN into the MP property at ROOT\ccm\LocationServices:SMS_MPInformation.MP="<IBCM FQDN>". This allows the agent to successfully find the Recovery Service MP and communicate!
I am aware that there may be more to it than just facilitating this communication but wanted to at least share that achieving…
25 votes -
Support MBAM / Bitlocker Management IIS roles on CMG
Seeing how the Recovery Service endpoint only requires IIS and a Management Point role, would it be feasible to have the endpoint run on CMG?
Internet-based clients in a co-management environment cannot reach the internal MP URL. Unless they use a VPN connection. We could leverage the BitLocker CSP policies available in Intune but that doesn't offer integration with recovery keys stored in the SQL DB, or the Helpdesk and Self-Service portals.
Supporting the MBAM role through CMG could be a quick win.
49 votes -
Include the ability to add a hash to endpoint protection
I do not see a way to add a hash to endpoint protection. We had malware recently that endpoint protection did not catch. We have the hash number but I didn't find a way in SCCM to add that.
3 votes -
Antivirus exception control gap
Since implementing antivirus exceptions are a control gap, please allow windows defender to optionally audit excluded directories in scheduled scans in an audit only mode.
1 vote -
"Endpoint protection Definition Update Date and Time" / "Antivirus Signature Update Date and Time" missing in the SCCM Defender Console
Post the Upgrade of SCCM version to 2010, We do not see "Endpoint protection Definition Update Date and Time" / "Antivirus Signature Update Date and Time" option and it is missing in the SCCM Defender Console.
With this option we used to measure our daily compliance, Though we have Signature versions, that it gets multiple release in a single day it is very difficult for us track with SIngature versions, rather we use the date and time of the signature gets downloaded and reported to the endpoints.
Without this option we are totally unable to perform any of our daily/weekly…1 vote -
Windows Defender Application Guard support for Enterprise PKI
When Application Guard is configured through Group Policy, Enterprise PKI roots can be imported into the Application Guard container, but this setting is not available directly in Configuration Manager.
Adding this setting to Configuration Manager would allow easier configuration, and also prevent having two places where Application Guard is configured.
1 vote -
Defender for Endpoint Advanced Hunting allow Timerange more than 30 Days
Please allow to use a Timerange which is more than 30 Days on Advanced Hunting.
The Tenant saves Data for 180 Days, but on Advanced Hunting you can only use 30days as max timerange.
If you was Hunting Malware, you need sometimes more than 30 Days.3 votes -
Defender for Endpoint Advanced Hunting RBAC
Please set an RBAC-Model for the Advanced Hunting Feature, like the RBAC-Model for Log Analytics.
This will give us more control, who can access the critical data from Advanced Hunting.3 votes -
mbam 2016
Support MBAM Services on Windows Server 2016/2019 systems. We have Physical servers with TPM and bitlocked drives but are unable to leverage the MBAM client and policies on Server class operating systems.
1 vote -
Allow the use of BitLockers management Self-Service\Help Desk portals when using non-standard SQL ports
Would like to be able to use BitLocker Management portals when using non-standard SQL ports. Currently the install script\configuration requires standard ports in order to be able to install.
2 votes -
MBAM fully integrated in 1910 does not have enforcement option
Great to see MBAM fully integrated in CM 1910, but the policy does not have any option to enforce the encryption. User can always postpone it.
For more info, see this: https://www.youtube.com/watch?v=kRkyx_-l9QU
57 votes -
Include all ASR Rules in Windows Defender Exploit Guard
Some Attack Surface Reduction Rules are missing in the Windows Defender Exploit Guard settings.
Please include the following Rules:
Block Office communication application from creating child processes
Block Adobe Reader from creating child processes
Block persistence through WMI event subscription47 votes -
Enable Tamper Protection via SCCM
It would be nice to have ability to enable Tamper Protection in defender via SCCM antimalware policy
76 votesThanks for your feedback, updating status to Noted.
See https://docs.microsoft.com/en-us/mem/configmgr/core/understand/find-help#send-a-suggestion for an explanation of each value.
-
Add time based policys
For policies, especially related to content filtering, it would be great to have much more strict enforcement during business hours than during non-business hours on company equipment.
Alternately this would be a good tool to help enforce usage policies for hourly employees who should not be accessing certain equipment after business hours to ensure there are no labor law violations.
1 vote -
Enhance Web Content Reporting For Time of Day
When reporting it would be great to see time of day for activity. For example, I may care less about social media or YouTube usage in evenings on company equipment than during the day.
1 vote -
Manage Controlled Folder Access on Windows Server 2019
Be able to manage Controlled Folder Access on Windows Server 2019 from Microsoft Endpoint Configuration Manager
3 votes -
Defender ATP onboarding policy shows error when successful
Defender ATP onboarding policy shows error when successful.
0 votes -
Deploy Microsoft Defender ATP Policy to user collection
It should be possible to deploy a Microsoft Defender ATP Policy to a User collection, not just a Device collection.
1 vote
- Don't see your idea?