James Li Can Hack

MDE Location Reference - Process, Registry, Log, Event

The following table focuses on Windows 10/11 and Windows Server 2012 R2 and later, covering core antivirus, EDR, and related processes. Note that some processes may vary slightly depending on the Windows version or Defender platform update.

ProcessLocationPurpose
ConfigSecurityPolicy.exeC:\Program Files\Windows DefenderSecurity Policy Configuration: Applies security policies and configurations for Microsoft Defender
MpCmdRun.exeC:\Program Files\Windows Defender or C:\ProgramData\Microsoft\Windows Defender\Platform\<version>Antivirus command-line utility
MpDlpCmd.exeC:\Program Files\Windows DefenderData loss prevention (DLP) command-line utility
MsMpEng.exeC:\Program Files\Windows Defender or C:\ProgramData\Microsoft\Windows Defender\Platform\<version>Defender Antivirus service
MpDefenderCoreService.exeC:\Program Files\Windows Defender or C:\ProgramData\Microsoft\Windows Defender\Platform\<version>Microsoft Defender Core Service: Manages telemetry collection, configuration updates, and reliability tasks for Microsoft Defender Antivirus and MDE components
MsSense.exeC:\Program Files\
Windows Defender Advanced Threat Protection
Defender for Endpoint EDR sensor service
NisSrv.exeC:\Program Files\Windows DefenderDefender Antivirus Network
Real-Time Inspection/Network Protection service
SenseCnCProxy.exeC:\Program Files\
Windows Defender Advanced Threat Protection
Command and Control Proxy: Facilitates communication between the EDR sensor (MsSense.exe) and the Microsoft 365 Defender cloud
SenseIR.exeC:\Program Files\
Windows Defender Advanced Threat Protection
Sense Incident Response (IR)
module, used for LR and all other commands
SenseCE.exeC:\Program Files\
Windows Defender Advanced Threat Protection
Sense Classification Engine (CE) module, used for DLP
SenseSampleUploader.exeC:\Program Files\
Windows Defender Advanced Threat Protection
EDR sample upload module
SenseNdr.exeC:\Program Files\
Windows Defender Advanced Threat Protection
Sense Network Detection and Response (NDR) module
SenseSC.exeC:\Program Files\
Windows Defender Advanced Threat Protection
Sense Screenshot Capture (SC) module
SenseCM.exeC:\Program Files\
Windows Defender Advanced Threat Protection
Configuration Manager: Manages onboarding and configuration updates for MDE
WdNisSvc.exeC:\Program Files\Windows DefenderNetwork Inspection Service
MpSvc.dllC:\Program Files\Windows Defender or C:\ProgramData\Microsoft\Windows Defender\Platform\<version>Antivirus Service Library: Core library loaded by MsMpEng.exe
MpRtMon.dllC:\Program Files\Windows Defender or C:\ProgramData\Microsoft\Windows Defender\Platform\<version>Real-Time Monitoring Library
NisDrv.sysC:\Windows\System32\driversNetwork Inspection Driver: Works with WdNisSvc.exe to inspect network packets and detect malicious network behavior in real time
WdBoot.sysC:\Windows\System32\driversBoot-Time Protection Driver: Detect and block rootkits before the OS fully initializes
WdFilter.sysC:\Windows\System32\driversFile System Filter Driver: Monitors file system operations for real-time protection
WdDevFlt.sysC:\Windows\System32\driversDevice Filter Driver: Device control and monitoring (e.g. USB drives)

The following table shows some registry locations that contain MDE configurations, including exclusions, protection settings, and operational parameters. (Note that the order of precedence is group policy wins over MDM, which wins over preferences).

RegistryPurpose
HKLM\SOFTWARE\Microsoft\Windows DefenderPrimary registry hive for Defender Antivirus and MDE settings
HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Stores Group Policy or Intune-configured settings for MDE
HKLM\SOFTWARE\Microsoft\Windows Advanced Threat ProtectionContains EDR settings delivered from MDE
HKLM\SYSTEM\CurrentControlSet\Services\EventlogStores configuration for Event Viewer log file locations, which can be modified to redirect MDE-related logs

MDE generates several log files that provide detailed information about scans, detections, and system health.

LogLocationPurpose
MPLog-YYYYMMDD-HHMMSS.logC:\ProgramData\Microsoft\Windows Defender\SupportLogs detailed Defender AV activities, including scans, detections, and errors
MpSupportFiles.cabC:\ProgramData\Microsoft\Windows Defender\SupportContains diagnostic data collected via MpCmdRun.exe -GetFiles. Includes registry outputs (MPRegistry) and other troubleshooting data
MpSigStub.logC:\Windows\TempLogs definition update attempts
pfirewall.logC:\Windows\System32\LogFiles\FirewallLogs Windows Firewall events, which MDE uses for network reporting

The following event viewer logs are useful sources of real-time and historical data on MDE operations, including scans, detections, and errors.

EventPurpose
Applications and Services Logs > Microsoft > Windows > Windows Defender > OperationalPrimary log for Microsoft Defender Antivirus activities
1000: Scan started.
1001: Scan finished.
1006: Malware detected during a scan.
1007: Action taken against malware (e.g., quarantined, deleted).
2000: Signature version updated.
5007: Configuration change (e.g., exclusions added, script scanning disabled).
Applications and Services Logs > Microsoft > Windows > SENSE > OperationalEDR sensor (SENSE) events. Check for Critical, Warning, or Error levels to identify onboarding or connectivity issues
Windows Logs > ApplicationContains MDE onboarding script errors
Windows Logs > SystemContains system-level events related to MDE services

References


Anich, Joe, Justen Graves, and Paul Huijbregts. Microsoft Defender for Endpoint in Depth: Take Any Organization's Endpoint Security to the Next Level. Birmingham: Packt Publishing, 2023.