Check: MSDE-00-001300
Microsoft Defender for Endpoint STIG:
MSDE-00-001300
(in version v1 r1)
Title
Microsoft Defender for Endpoint (MDE) must enable Memory Content Analysis. (Cat II impact)
Discussion
Malicious code protection mechanisms include, but are not limited to, antivirus and malware detection software. To minimize potential negative impact to the organization that can be caused by malicious code, it is imperative that malicious code is identified and eradicated. This setting automatically investigates memory content of processes. When enabled, memory content can be uploaded to MDE during an Automated investigation.
Check Content
Access the MDE portal as a user with at least an MDE Administrator or equivalent role: 1. In the navigation pane, select Settings >> Endpoints >> Automation uploads (under Rules). 2. Verify the slide bar for "Memory Content Analysis" is set to "On". If the slide bar for "Memory Content Analysis" is not set to "On", this is a finding.
Fix Text
Access the MDE portal as a user with at least an MDE Administrator or equivalent role: 1. In the navigation pane, select Settings >> Endpoints >> Automation uploads (under Rules). 2. Set the slide bar for "Memory Content Analysis" to "On".
Additional Identifiers
Rule ID: SV-275995r1119725_rule
Vulnerability ID: V-275995
Group Title: SRG-APP-000279
Expert Comments
CCIs
| Number | Definition |
|---|---|
| CCI-001243 |
Configure malicious code protection mechanisms to block malicious code; quarantine malicious code; and/or take organization-defined action(s) in response to malicious code detection. |
Controls
| Number | Title |
|---|---|
| SI-3 |
Malicious Code Protection |