Skip to content

Commit 00164f3

Browse files
authored
Merge pull request #1718 from YongRhee-MSFT/docs-editor/deployment-vdi-microsoft-defen-1730132772
Update deployment-vdi-microsoft-defender-antivirus.md
2 parents 0406f55 + 699f033 commit 00164f3

File tree

1 file changed

+13
-15
lines changed

1 file changed

+13
-15
lines changed

defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Configure Microsoft Defender Antivirus on a remote desktop or virtual desktop infrastructure environment
33
description: Get an overview of how to configure Microsoft Defender Antivirus in a remote desktop or non-persistent virtual desktop environment.
44
ms.localizationpriority: medium
5-
ms.date: 09/27/2024
5+
ms.date: 10/28/2024
66
ms.topic: conceptual
77
author: denisebmsft
88
ms.author: deniseb
@@ -31,8 +31,7 @@ search.appverid: met150
3131

3232
- Windows
3333

34-
> [!TIP]
35-
> This article is designed for customers who are using Microsoft Defender Antivirus capabilities only. If you have Microsoft Defender for Endpoint (which includes Microsoft Defender Antivirus alongside additional device protection capabilities), skip this article and proceed to [Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR](configure-endpoints-vdi.md).
34+
This article is designed for customers who are using Microsoft Defender Antivirus capabilities only. If you have Microsoft Defender for Endpoint (which includes Microsoft Defender Antivirus alongside other device protection capabilities), also go through [Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR](configure-endpoints-vdi.md).
3635

3736
You can use Microsoft Defender Antivirus in a remote desktop (RDS) or non-persistent virtual desktop infrastructure (VDI) environment. Following the guidance in this article, you can configure updates to download directly to your RDS or VDI environments when a user signs in.
3837

@@ -43,7 +42,7 @@ This guide describes how to configure Microsoft Defender Antivirus on your VMs f
4342
- [Use quick scans](#use-quick-scans)
4443
- [Prevent notifications](#prevent-notifications)
4544
- [Disable scans from occurring after every update](#disable-scans-after-an-update)
46-
- [Scan out-of-date machines or machines that have been offline for a while](#scan-vms-that-have-been-offline)
45+
- [Scan out-of-date machines or machines that were offline for a while](#scan-vms-that-have-been-offline)
4746
- [Apply exclusions](#exclusions)
4847

4948
> [!IMPORTANT]
@@ -67,7 +66,7 @@ In Windows 10, version 1903, Microsoft introduced the shared security intelligen
6766

6867
5. Enter `\\<Windows File Server shared location\>\wdav-update` (for help with this value, see [Download and unpackage](#download-and-unpackage-the-latest-updates)).
6968

70-
6. Select **OK**, and then deploy the GPO to the VMs you want to test.
69+
6. Select **OK**, and then deploy the Group Policy Object to the VMs you want to test.
7170

7271
### PowerShell
7372

@@ -96,10 +95,9 @@ Start-Process -FilePath $vdmpackage -WorkingDirectory $vdmpath -ArgumentList "/x
9695

9796
You can set a scheduled task to run once a day so that whenever the package is downloaded and unpacked then the VMs receive the new update. We suggest starting with once a day, but you should experiment with increasing or decreasing the frequency to understand the impact.
9897

99-
Security intelligence packages are typically published once every three to four hours. Setting a frequency shorter than four hours isn't advisable because it will increase the network overhead on your management machine for no benefit.
98+
Security intelligence packages are typically published once every three to four hours. Setting a frequency shorter than four hours isn't advisable because it increases the network overhead on your management machine for no benefit.
10099

101-
You can also set up your single server or machine to fetch the updates on behalf of the VMs at an interval and place them in the file share for consumption.
102-
This configuration is possible when the devices have the share and read access (NTFS permissions) to the share so they can grab the updates. To set up this configuration, follow these steps:
100+
You can also set up your single server or machine to fetch the updates on behalf of the VMs at an interval and place them in the file share for consumption. This configuration is possible when the devices have share and read access (NTFS permissions) to the share so they can grab the updates. To set up this configuration, follow these steps:
103101

104102
1. Create an SMB/CIFS file share.
105103

@@ -122,7 +120,7 @@ This configuration is possible when the devices have the share and read access (
122120

123121
### Set a scheduled task to run the PowerShell script
124122

125-
1. On the management machine, open the Start menu and type `Task Scheduler`. From the results, Task Scheduler and then select **Create task...** on the side panel.
123+
1. On the management machine, open the Start menu and type `Task Scheduler`. From the results, select Task Scheduler and then select **Create task...** in the side panel.
126124

127125
2. Specify the name as `Security intelligence unpacker`.
128126

@@ -151,7 +149,7 @@ If you would prefer to do everything manually, here's what to do to replicate th
151149
Here's an example: `c:\wdav_update\{00000000-0000-0000-0000-000000000000}`
152150

153151
> [!NOTE]
154-
> In the script we set it so the last 12 digits of the GUID are the year, month, day, and time when the file was downloaded so that a new folder is created each time. You can change this so that the file is downloaded to the same folder each time.
152+
> We set the script so that the last 12 digits of the GUID are the year, month, day, and time when the file was downloaded so that a new folder is created each time. You can change this so that the file is downloaded to the same folder each time.
155153
156154
3. Download a security intelligence package from [https://www.microsoft.com/wdsi/definitions](https://www.microsoft.com/wdsi/definitions) into the GUID folder. The file should be named `mpam-fe.exe`.
157155

@@ -164,7 +162,7 @@ If you would prefer to do everything manually, here's what to do to replicate th
164162

165163
Scheduled scans run in addition to [real-time protection and scanning](configure-real-time-protection-microsoft-defender-antivirus.md).
166164

167-
The start time of the scan itself is still based on the scheduled scan policy (**ScheduleDay**, **ScheduleTime**, and **ScheduleQuickScanTime**). Randomization will cause Microsoft Defender Antivirus to start a scan on each machine within a four-hour window from the time set for the scheduled scan.
165+
The start time of the scan itself is still based on the scheduled scan policy (**ScheduleDay**, **ScheduleTime**, and **ScheduleQuickScanTime**). Randomization causes Microsoft Defender Antivirus to start a scan on each machine within a four-hour window from the time set for the scheduled scan.
168166

169167
See [Schedule scans](schedule-antivirus-scans.md) for other configuration options available for scheduled scans.
170168

@@ -194,14 +192,14 @@ Sometimes, Microsoft Defender Antivirus notifications are sent to or persist acr
194192

195193
4. Deploy your Group Policy object as you usually do.
196194

197-
Suppressing notifications prevents notifications from Microsoft Defender Antivirus from showing up when scans are done or remediation actions are taken. However, your security operations team will see the results of a scan if an attack is detected and stopped. Alerts, such as an initial access alert, are generated and will appear in the [Microsoft Defender portal](https://security.microsoft.com).
195+
Suppressing notifications prevents notifications from Microsoft Defender Antivirus from showing up when scans are done or remediation actions are taken. However, your security operations team sees the results of a scan if an attack is detected and stopped. Alerts, such as an initial access alert, are generated, and appear in the [Microsoft Defender portal](https://security.microsoft.com).
198196

199197
## Disable scans after an update
200198

201-
Disabling a scan after an update will prevent a scan from occurring after receiving an update. You can apply this setting when creating the base image if you have also run a quick scan. This way, you can prevent the newly updated VM from performing a scan again (as you've already scanned it when you created the base image).
199+
Disabling a scan after an update prevents a scan from occurring after receiving an update. You can apply this setting when creating the base image if you have also run a quick scan. This way, you can prevent the newly updated VM from performing a scan again (as you've already scanned it when you created the base image).
202200

203201
> [!IMPORTANT]
204-
> Running scans after an update will help ensure your VMs are protected with the latest security intelligence updates. Disabling this option will reduce the protection level of your VMs and should only be used when first creating or deploying the base image.
202+
> Running scans after an update helps ensure your VMs are protected with the latest security intelligence updates. Disabling this option reduces the protection level of your VMs and should only be used when first creating or deploying the base image.
205203
206204
1. In your Group Policy Editor, go to **Windows components** \> **Microsoft Defender Antivirus** \> **Security Intelligence Updates**.
207205

@@ -239,7 +237,7 @@ For more information, see [Start the scheduled scan only when computer is on but
239237

240238
5. Deploy your Group Policy Object as you usually do.
241239

242-
This policy forces a scan if the VM has missed two or more consecutive scheduled scans.
240+
This policy forces a scan if the VM missed two or more consecutive scheduled scans.
243241

244242
## Enable headless UI mode
245243

0 commit comments

Comments
 (0)