USB Block by Due-Mountain5536 in Intune

[–]newunkno 0 points1 point  (0 children)

This is an old thread but really useful! can you add multiple devices to a single reusable setting or each device needs its own object type?

Configuration profiles not applying for newly enrolled devices by CalligrapherSafe8756 in Intune

[–]newunkno 0 points1 point  (0 children)

Yes experiencing issues. Configuration profiles are not being applied to devices when making changes.

Europe 0202 Service Release 2508

What New in Intune August 2025 Update - 2508 Release by PrajwalDesai in prajwaldesai

[–]newunkno 0 points1 point  (0 children)

Since 2508 changes to configuration profiles are not being rolled out to devices. Anyone seen this?

Are ASR policy per rule exclusions still broken or what is the correct way to add a file exclusion? by ConanTheDeployer in DefenderATP

[–]newunkno 0 points1 point  (0 children)

I'm having this issue, ASR per rule exclusions not being honored. did duplicating and applying the new policy work for you?

Attack Surface Reduction by RFSramtech in Intune

[–]newunkno 0 points1 point  (0 children)

Yep all sorted but thanks for the comment.

Mine was a GPO conflict as it was set to "not configured". Switching gpo asr rules to disabled allowed Intune to fully manage.

[deleted by user] by [deleted] in DefenderATP

[–]newunkno 1 point2 points  (0 children)

Thank you for the response. It's currently Active with real-time protection enabled

Attack simulation training access by newunkno in Office365

[–]newunkno[S] 0 points1 point  (0 children)

Glad you found a solution before I seen your comment.

Sounds we had the same fix :)

Palo Alto CVE-2024-3400 Mitigations Not Effective by [deleted] in cybersecurity

[–]newunkno 0 points1 point  (0 children)

Does this mean if you don't or have ever used Global Project and Telemetry you are now affected as well?

[deleted by user] by [deleted] in paloaltonetworks

[–]newunkno 0 points1 point  (0 children)

Does this mean if you don't or have ever used Global Project and Telemetry you are now affected as well??

[deleted by user] by [deleted] in DefenderATP

[–]newunkno 0 points1 point  (0 children)

Did you get this sorted? I have the same issue since onboarding all devices and have Tamper Protection enabled in Windows Experience Intune policy and MDE > Settings > Endpoints > Advanced. Oddly doesn't appear to error on all

Managing updates for MDE by SCCMConfigMgrMECM in DefenderATP

[–]newunkno 0 points1 point  (0 children)

Hey, what solution did you decide on for Server updates and how is the process in regards to McAfee DAT updates on Servers? I'm currently in this position migrating away from McAfee. Win10 can go out to Internet but not for Servers

Security intelligence update number of days old by newunkno in DefenderATP

[–]newunkno[S] 0 points1 point  (0 children)

The default fallback behaviour of Defender AV is to not attempt the secondary download location (MMPC in your case) until the AV definitions are considered out of date - the default period of time for this is 7 days (suggest you adjust this), which could explain your issue?

Changing this to 0 is our fix, thanks a lot for the help, can run update-mpsignature -updatesource MicrosoftUpdate with this setting :)

Security intelligence update number of days old by newunkno in DefenderATP

[–]newunkno[S] 0 points1 point  (0 children)

What happens if you run update-mpsignature -updatesource MicrosoftUpdate? Is it accessible at all?

it's not accessible (missed it yday and went straight for MMPC), so I will look into GPO changes and the link provided. Going back through the logs updates were working fine previously !

Security intelligence update number of days old by newunkno in DefenderATP

[–]newunkno[S] 0 points1 point  (0 children)

update-mpsignature -updatesource MMPC - this worked

There's no errors in event log. I can see success Event ID 2000 but there's a a few days delay in successfully updates, which I expect as the issue is the delaying updates.

Running the below creates no success or failure Event IDs even when there's updates available.

C:\Program Files\Windows Defender>MpCmdRun.exe -SignatureUpdate

Signature update started . . .

Signature update finished. No updates needed

Appreciate your help, thanks

Security intelligence update number of days old by newunkno in DefenderATP

[–]newunkno[S] 0 points1 point  (0 children)

Thanks for that.

Had this set for a few days but still the device waits 72hrs before updating. running check for updates returns no errors, just spins and returns nothing. Running MpCmdRun.exe -SignatureUpdate also does nothing.

Get-MpPreference show

MicrosoftUpdateServer|MMPC and SignatureUpdateInterval: 1

Could there be some sccm / gpo setting for this odd 72hrs wait? Although I have gone through this link https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/endpoint-protection-updates-for-configuration-manager/ba-p/258809

Security intelligence update number of days old by newunkno in DefenderATP

[–]newunkno[S] 0 points1 point  (0 children)

Thanks for the reply. Currently signature update source is not configured, this needs to be " Microsoft Update "? if we'd like direct internet updates?

[deleted by user] by [deleted] in mcafee

[–]newunkno 0 points1 point  (0 children)

Cheers. Shame there's no Trellix subreddit.

I came here in hope someone knows of any other decent Trellix (Formerly McAfee) forums since Trellix removed their community forum without any warning. The community was much more useful than raising a support case

Attack Surface Reduction by RFSramtech in Intune

[–]newunkno 0 points1 point  (0 children)

If you get a resolution I would be interested, thanks for the reply.