Back to Blog

How StepSecurity Harden Runner Detected Unexpected Microsoft Defender Installation on GitHub-hosted Ubuntu Runners

Microsoft Defender was unexpectedly installed on multiple workflow runs from mid-July through mid-August, causing abnormal network traffic. StepSecurity Harden Runner detected this infrastructure anomaly within hours, and GitHub Support has since resolved the issue
Varun Sharma
View LinkedIn

September 2, 2025

Share on X
Share on X
Share on LinkedIn
Share on Facebook
Follow our RSS feed
Table of Contents

Introduction

This is the story of how StepSecurity Harden Runner's runtime security monitoring uncovered an unexpected and widespread infrastructure change that affected a large number of GitHub Actions workflows worldwide. When Microsoft Defender was unintentionally deployed to some Ubuntu runners on GitHub's infrastructure, it was our automated anomaly detection that raised the alarm, demonstrating the critical importance of runtime visibility in modern CI/CD pipelines.

While this was not a security incident, such anomalous calls have in the past been associated with supply chain attacks. For example, in March 2025 an anomalous outbound call led to the discovery that the tj-actions/changed-files action had been compromised.  

What makes this discovery particularly significant is that without runtime monitoring, this change would have remained invisible to most organizations – silently consuming resources, generating unexpected network traffic, and potentially interfering with builds.  

Here's how we detected it, what it means for CI/CD security, and why every organization needs runtime monitoring for their pipelines.

The Discovery: Anomalous Network Calls Raise Red Flags

Starting July 15th 2025, StepSecurity Harden Runner began detecting unusual network activity across multiple GitHub Actions workflows running on GitHub-hosted Ubuntu runners.

What Happened: Unintended Defender Deployment

Through Harden Runner's network monitoring capabilities, we identified that the wdavdaemon process (Microsoft Defender's daemon) was making calls to various Microsoft endpoints including:

  • x.cp.wd.microsoft.com
  • global.endpoint.security.microsoft.com
  • wdcp.microsoft.com

These calls were observed across both our enterprise and community tier customers, affecting Ubuntu runners on both standard and larger GitHub-hosted runners.

Harden Runner dashboard showing network events with Microsoft Defender endpoints highlighted

One concrete example was captured through our community tier's public insights in the PicnicSupermarket/error-prone-support repository (Run #16319862376), where Harden Runner clearly showed the unexpected network activity.

GitHub's Response: Confirming the Unintentional Installation

After reporting our findings to GitHub Support and creating an issue in the actions/runner-images repository (#12656), GitHub's engineering team investigated and confirmed our observations.

Their response on our enterprise support ticket validated what Harden Runner had detected:

"Our engineers identified cases where Virtual Machine resources erroneously had Microsoft Defender Endpoint applied, resulting in the behavior that you saw. This was unintentional, and we believe that we've now corrected this."

                            GitHub Support Response

GitHub acknowledged that this was an unintended configuration error and has since corrected the issue while implementing measures to prevent similar incidents in the future.

How Harden Runner Detected the Anomaly

Intelligent Baseline and Anomaly Detection

Harden Runner's detection capabilities go beyond simple monitoring. The system automatically creates an intelligent baseline for each job, learning the normal network behavior patterns of your workflows. When new outbound calls occur that aren't part of this established baseline, Harden Runner immediately triggers detections and alerts.

In this case, calls to Microsoft Defender endpoints were immediately flagged as anomalous because they had never been part of the baseline behavior for any of the jobs. This automatic anomaly detection meant that the issue was caught within hours of its introduction, rather than potentially going unnoticed for weeks or months.

Active Blocking and Detection Triggers

Many of our users have configured Harden Runner in block mode based on their established baselines. When the Defender endpoints weren't in their allowed lists, these unexpected calls were automatically blocked, which:

  • Prevented unwanted network traffic from leaving the CI/CD environment
  • Triggered immediate detection notifications alerting teams to the anomaly

This proactive blocking meant that many teams were protected from the issue even before understanding what was happening, demonstrating the value of runtime security policies in CI/CD.

Community Tier: Network Visibility

With our community tier which is free for open-source projects using GitHub-hosted runners, Harden Runner provides valuable network monitoring that made this discovery possible. Users could see:

  • Unexpected domains: Calls to *.microsoft.com endpoints that shouldn't exist on Ubuntu runners
  • Blocked calls: Blocked calls to Microsoft Defender endpoints
  • Public transparency: All network insights are publicly available for open-source projects
Community tier network events view showing list of Microsoft Defender related domains

Enterprise Tier: Deep Process Intelligence

For our enterprise customers, Harden Runner provided even deeper visibility into the issue:

  • Command arguments: Full command-line arguments showing how the Defender daemon was launched
  • Process lineage: Understanding which processes spawned the Defender components
  • Real-time notifications: Alerts via Slack/email when anomalies are detected
  • SIEM integration: Integration with SIEM solutions for centralized security monitoring

Enterprise Tier view showing process arguments

This granular visibility allowed enterprise users to immediately understand not just that something unusual was happening, but exactly what was running and how it was configured.

The Importance of Runtime Security in CI/CD

This incident underscores several critical points about CI/CD security:

1. Infrastructure Changes Can Happen Without Notice

Even unintentional changes to GitHub-hosted runners can impact your workflows. Without monitoring, these changes remain invisible until they cause problems.

2. Network Monitoring Reveals Hidden Behavior

Unexpected network calls are often the first indicator of unwanted software or security issues. Harden Runner's network monitoring caught behavior that would otherwise go unnoticed.

3. Process-Level Visibility is Critical

Understanding not just what network calls are being made, but which processes are making them, is essential for rapid diagnosis and response.

4. Community Benefits from Transparency

Our community tier's public insights meant that this issue could be identified and verified across multiple organizations, leading to faster resolution.

Protecting Your Pipelines with Harden Runner

This Microsoft Defender incident is just one example of how runtime security monitoring can protect your CI/CD pipelines from unexpected changes and potential security risks.

In fact, Harden Runner's anomaly detection has proven its value in catching actual security incidents as well. In March 2025, Harden Runner detected the tj-actions/changed-files compromise by identifying an anomalous call to gist.githubusercontent.com – a domain that wasn't part of the action's normal behavior baseline. This early detection helped prevent potential supply chain attacks before they could spread.

Harden Runner provides:

  • Real-time network monitoring to detect anomalous connections
  • Intelligent baseline creation that learns your workflows' normal behavior
  • Automated blocking of unexpected network calls to prevent data exfiltration
  • Process monitoring (Enterprise) to understand exactly what's running in your workflows

Whether you're using our free community tier or our enterprise solution, Harden Runner acts as your early warning system for CI/CD anomalies.

Start Monitoring in 60 Seconds

Protect your GitHub Actions workflows running on GitHub-hosted runners today by adding Harden Runner to your pipelines:

- uses: step-security/harden-runner@v2
  with:     
    egress-policy: audit 

For enterprise features including detailed process monitoring and private insights, start a 14 day free trial.

Conclusion

The unexpected installation of Microsoft Defender on GitHub-hosted Ubuntu runners demonstrates that even well-managed cloud infrastructure can experience configuration drift. Without StepSecurity Harden Runner's runtime monitoring, this issue might have gone undetected for much longer, potentially impacting build times, creating unexpected network traffic, and raising security concerns.

This incident reinforces our belief that runtime security monitoring is not optional for modern CI/CD pipelines – it's essential. As organizations increasingly rely on GitHub Actions and other CI/CD platforms, having visibility into what's actually happening during workflow execution becomes critical for both security and operational excellence.

Stay secure, stay informed, and keep your pipelines protected with StepSecurity Harden Runner.

Blog

Explore Related Posts