Defender for Endpoint Alerts with v2.0.0 - Headless ConHost Process Executed/Suspicious Conhost Child Process #754
bbaird-psb
started this conversation in
General
Replies: 1 comment
-
It is not about the code itself, but how it is launched. The method will stay like that for some time. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hi all,
We have been happy users of 1.X for about 6 months now. We have it pushed to all of our Windows 10 & 11 systems, and it is working well. Thank you to everyone that has contributed to this project!
I started testing 2.0.0 a few weeks ago and Microsoft Defender for Endpoint keeps generating alerts like this:
These are the commands that usually trigger it with winget-notify.ps1, although I saw it triggered once by winget-upgrade.ps1:
If I revert back to 1.21.7, we don't get the alerts at all.
I'm curious if anyone else is seeing this with Defender or other AV/EDR, if anyone has any suggestions on how to handle, or if the changes that are triggering this were made on purpose? We can probably put these files on an allow list, but I always prefer not to do that whenever possible.
Thanks!
Beta Was this translation helpful? Give feedback.
All reactions