Skip to content

Commit 011efb1

Browse files
authored
Merge pull request #2811 from MicrosoftDocs/main
pushing fixes live
2 parents 1569b2c + 2dd0e11 commit 011efb1

13 files changed

+74
-35
lines changed

defender-endpoint/configure-exclusions-microsoft-defender-antivirus.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure custom exclusions for Microsoft Defender Antivirus
33
description: You can exclude files (including files modified by specified processes) and folders from Microsoft Defender Antivirus scans.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 01/27/2025
6+
ms.date: 02/18/2025
77
author: emmwalshh
88
ms.author: ewalsh
99
ms.custom: nextgen
@@ -36,6 +36,13 @@ Custom exclusions apply to [scheduled scans](schedule-antivirus-scans.md), [on-d
3636
> [!TIP]
3737
> For a detailed overview of suppressions, submissions, and exclusions across Microsoft Defender Antivirus and Defender for Endpoint, see [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
3838
39+
## Hide the antivirus exclusions from users and/or local administrators
40+
41+
| Setting | Description | Default value |
42+
| -------- | -------- | -------- |
43+
|**Configure if exclusions are visible to Local Admins** | - **Disabled (Default)**: If you disable or don't configure this setting, Local Admins are able to see exclusions in the Windows Security App or via PowerShell. <br> - **Enabled**: If this setting is enabled, Local Admins no longer see the exclusion list in Windows Security App or via PowerShell. <br> - Please note that applying this setting won't remove exclusions, it prevents them from being visible to Local Admins. This is reflected in Get-MpPreference. <br> | Disabled |
44+
|**Configure whether exclusions are visible to local users** | - Use this policy setting to configure whether or not exclusions are visible to Local Admins (HideExclusionsFromLocalAdmins). | Disabled |
45+
3946
## Configure and validate exclusions
4047

4148
> [!CAUTION]
@@ -45,11 +52,13 @@ Custom exclusions apply to [scheduled scans](schedule-antivirus-scans.md), [on-d
4552
If you're using Microsoft Intune to manage Microsoft Defender Antivirus or Microsoft Defender for Endpoint, use the following procedures to define exclusions:
4653

4754
- [Configure custom exclusions for Microsoft Defender Antivirus](#configure-custom-exclusions-for-microsoft-defender-antivirus)
55+
- [Hide the antivirus exclusions from users and/or local administrators.](#hide-the-antivirus-exclusions-from-users-andor-local-administrators)
4856
- [Configure and validate exclusions](#configure-and-validate-exclusions)
4957
- [Manage antivirus exclusions in Intune (for existing policies)](#manage-antivirus-exclusions-in-intune-for-existing-policies)
5058
- [Create a new antivirus policy with exclusions in Intune](#create-a-new-antivirus-policy-with-exclusions-in-intune)
5159
- [Important points about exclusions](#important-points-about-exclusions)
5260
- [Audit antivirus exclusions on Exchange systems](#audit-antivirus-exclusions-on-exchange-systems)
61+
- [See also](#see-also)
5362

5463
If you're using another tool, such as Configuration Manager or Group Policy, or you want more detailed information about custom exclusions, see these articles:
5564

@@ -114,7 +123,7 @@ Remember these important points:
114123

115124
## Audit antivirus exclusions on Exchange systems
116125

117-
Microsoft Exchange has supported integration with the Antimalware Scan Interface (AMSI) since the June 2021 Quarterly Updates for Exchange (see [Running Windows antivirus software on Exchange servers](/exchange/antispam-and-antimalware/windows-antivirus-software)). It's highly recommended to install these updates and make sure that AMSI is working properly. See [Microsoft Defender Antivirus security intelligence and product updates](microsoft-defender-antivirus-updates.md).
126+
Microsoft Exchange has supported integration with the anti-malware Scan Interface (AMSI) since the June 2021 Quarterly Updates for Exchange (see [Running Windows antivirus software on Exchange servers](/exchange/antispam-and-antimalware/windows-antivirus-software)). It's highly recommended to install these updates and make sure that AMSI is working properly. See [Microsoft Defender Antivirus security intelligence and product updates](microsoft-defender-antivirus-updates.md).
118127

119128
Many organizations exclude the Exchange directories from antivirus scans for performance reasons. Microsoft recommends auditing Microsoft Defender Antivirus exclusions on Exchange systems and assessing whether exclusions can be removed without impacting performance in your environment to ensure the highest level of protection. Exclusions can be managed by using Group Policy, PowerShell, or systems management tools like Microsoft Intune.
120129

defender-endpoint/manage-outdated-endpoints-microsoft-defender-antivirus.md

Lines changed: 25 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Apply Microsoft Defender Antivirus protection updates to out of date endpoints
3-
description: Define when and how updates should be applied for endpoints that haven't updated in a while.
3+
description: Define when and how updates should be applied for out of date endpoints in Microsoft Defender Antivirus.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
66
ms.topic: conceptual
@@ -14,7 +14,7 @@ ms.collection:
1414
- m365-security
1515
- tier3
1616
search.appverid: met150
17-
ms.date: 04/08/2021
17+
ms.date: 02/18/2025
1818
---
1919

2020
# Manage Microsoft Defender Antivirus updates and scans for endpoints that are out of date
@@ -45,7 +45,7 @@ You can use one of several methods to set up catch-up protection updates:
4545

4646
### Use Configuration Manager to configure catch-up protection updates
4747

48-
1. On your Microsoft Configuration Manager console, open the antimalware policy you want to change (select **Assets and Compliance** in the navigation pane on the left, then expand the tree to **Overview** \> **Endpoint Protection** \> **Antimalware Policies**)
48+
1. On your Microsoft Configuration Manager console, open the anti-malware policy you want to change (select **Assets and Compliance** in the navigation pane on the left, then expand the tree to **Overview** \> **Endpoint Protection** \> **Antimalware Policies**)
4949

5050
2. Go to the **Security intelligence updates** section and configure the following settings:
5151

@@ -58,7 +58,7 @@ You can use one of several methods to set up catch-up protection updates:
5858

5959
### Use Group Policy to enable and configure the catch-up update feature
6060

61-
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and then select **Edit**.
61+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)). Right-click the Group Policy Object you want to configure and then select **Edit**.
6262

6363
2. In the **Group Policy Management Editor** go to **Computer configuration**.
6464

@@ -119,9 +119,9 @@ You can use Group Policy to specify the number of days after which endpoint prot
119119

120120
4. Select **OK**.
121121

122-
## Set up catch-up scans for endpoints that have not been scanned for a while
122+
## Set up catch-up scans for endpoints that haven't been scanned for a while
123123

124-
You can set the number of consecutive scheduled scans that can be missed before Microsoft Defender Antivirus will force a scan.
124+
You can set the number of consecutive scheduled scans that can be missed before Microsoft Defender Antivirus forces a scan.
125125

126126
The process for enabling this feature is:
127127

@@ -145,7 +145,7 @@ You can use one of several methods to set up catch-up scans:
145145

146146
### Use Group Policy to enable and configure the catch-up scan feature
147147

148-
1. Ensure you have set up at least one scheduled scan.
148+
1. Ensure you set up at least one scheduled scan.
149149

150150
2. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**.
151151

@@ -193,14 +193,31 @@ See the following article for more information and allowed parameters:
193193

194194
### Use Configuration Manager to configure catch-up scans
195195

196-
1. On your Microsoft Configuration Manager console, open the antimalware policy you want to change (select **Assets and Compliance** in the navigation pane on the left, then expand the tree to **Overview** \> **Endpoint Protection** \> **Antimalware Policies**)
196+
1. On your Microsoft Configuration Manager console, open the anti-malware policy you want to change (select **Assets and Compliance** in the navigation pane on the left, then expand the tree to **Overview** \> **Endpoint Protection** \> **Antimalware Policies**)
197197

198198
2. Go to the **Scheduled scans** section and **Force a scan of the selected scan type if client computer is offline...** to **Yes**.
199199

200200
3. Select **OK**.
201201

202202
4. [Deploy the updated policy as usual](/sccm/protect/deploy-use/endpoint-antimalware-policies#deploy-an-antimalware-policy-to-client-computers).
203203

204+
### Use Group Policy to configure security intelligence updates over a metered connection
205+
206+
1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**.
207+
208+
1. In the **Group Policy Management Editor**, go to **Computer configuration**.
209+
210+
1. Select **Policies** and then select **Administrative templates**.
211+
212+
1. Expand the tree to **Windows components > Microsoft Defender Antivirus > Security Intelligence Update** and configure the following settings:
213+
214+
- If you have set up scheduled quick scans, double-click the Allow Microsoft Defender Antivirus to update and communicate over a metered connection setting and set the option to **Enabled**.
215+
- Select **OK**.
216+
217+
|Settings| Description| Default |
218+
| -------- | -------- | -------- |
219+
|Allow Microsoft Defender Antivirus to update and communicate over a metered connection.|Enabling this policy will automatically download updates, even over metered data connections (charges may apply)| Disabled |
220+
204221
> [!TIP]
205222
> If you're looking for Antivirus related information for other platforms, see:
206223
> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)

defender-endpoint/microsoft-defender-endpoint-mac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ These three most recent major releases of macOS are supported.
7979
- Beta versions of macOS aren't supported.
8080

8181
> [!IMPORTANT]
82-
> On macOS 11 (Large Sur) and later, Microsoft Defender for Endpoint requires more configuration profiles. If you're an existing customer upgrading from earlier versions of macOS, make sure to deploy the extra configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md) and detailed in [installation instructions](#installation-instructions).
82+
> On macOS 11 (Big Sur) and later, Microsoft Defender for Endpoint requires more configuration profiles. If you're an existing customer upgrading from earlier versions of macOS, make sure to deploy the extra configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md) and detailed in [installation instructions](#installation-instructions).
8383
8484
After you've enabled the service, you might need to configure your network or firewall to allow outbound connections between it and your endpoints.
8585

defender-endpoint/schedule-antivirus-scans-group-policy.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
author: emmwalshh
77
ms.author: ewalsh
88
ms.custom: nextgen
9-
ms.date: 09/07/2024
9+
ms.date: 02/18/2025
1010
ms.reviewer: pauhijbr, ksarens
1111
manager: deniseb
1212
ms.subservice: ngp
@@ -37,27 +37,28 @@ This article describes how to configure scheduled scans using Group Policy. To l
3737

3838
2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
3939

40-
3. Specify settings for the Group Policy Object, and then select **OK**.
40+
3. Specify the settings for the Group Policy Object, and then select **OK**.
4141

4242
4. Repeat steps 1-4 for each setting you want to configure.
4343

4444
5. Deploy your Group Policy Object as you normally do. If you need help with Group Policy Objects, see [Create a Group Policy Object](/windows/security/threat-protection/windows-firewall/create-a-group-policy-object).
4545

4646
> [!NOTE]
47-
> When configuring scheduled scans, the setting **Start the scheduled scan only when computer is on but not in use**, which is enabled by default, can impact the expected scheduled time by requiring the machine to be idle first.
47+
> When configuring scheduled scans, the setting **Start the scheduled scan only when computer is on but not in use** (which is enabled by default) can affect the expected scheduled time by requiring the machine to be idle first.
4848
>
49-
> For weekly scans, default behavior on Windows Server is to scan outside of automatic maintenance when the machine is idle. The default on Windows 10 and later is to scan during automatic maintenance when the machine is idle. To change this behavior, modify the settings by disabling **ScanOnlyIfIdle**, and then define a schedule.
49+
> For weekly scans, the default behavior on Windows Server and Windows 10 and later, is to scan outside of the automatic maintenance when the machine is idle. To change this behavior, modify the settings by disabling **ScanOnlyIfIdle**, and then define a schedule.
5050
51-
For more information, see the [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md) and [Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md) topics.
51+
For more information, see the [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md) and [Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md) articles.
5252

5353
## Group Policy settings for scheduling scans
5454

5555
| Location | Setting | Description | Default setting (if not configured) |
5656
|:---|:---|:---|:---|
57-
| Scan | Specify the scan type to use for a scheduled scan | Quick scan |
57+
| Scan | Specify the scan type to use for a scheduled scan | Quick scan ||
5858
| Scan | Specify the day of the week to run a scheduled scan | Specify the day (or never) to run a scan. | Never |
59-
| Scan | Specify the time of day to run a scheduled scan | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.). | 2 a.m. |
60-
| Root | Randomize scheduled task times |In Microsoft Defender Antivirus, randomize the start time of the scan to any interval from 0 to 23 hours. By default, scheduled tasks begin at a random time within four hours of the time specified in Task Scheduler. | Enabled |
59+
| Scan | Specify the time of day to run a scheduled scan | Specify the number of minutes after midnight to run a scan (for example, enter **60** for 1 AM). | 2 AM. |
60+
| Root | Randomize scheduled task times |In Microsoft Defender Antivirus, randomize the start time of the scan to any interval from **0 to 23 hours**. By default, scheduled tasks begin at a random time within four hours of the time specified in Task Scheduler. | Enabled |
61+
| Root | Configure scheduled task times randomization window |- This setting lets you set the start time for scheduled task scans and security updates. <br> - When enabled, you can choose a randomization window between **1 and 23 hours**. <br> - The Randomize Scheduled Task Times uses the specified window. <br> - If disabled or not configured, it randomizes times between **0 and 4 hours**. | Not configured (Disabled)|
6162

6263
## Group Policy settings for scheduling scans for when an endpoint isn't in use
6364

@@ -66,21 +67,21 @@ For more information, see the [Manage when protection updates should be download
6667
| Scan | Start the scheduled scan only when computer is on but not in use | Scheduled scans won't run, unless the computer is on but not in use | Enabled |
6768

6869
> [!NOTE]
69-
> When you schedule scans for times when endpoints aren't in use, scans don't honor the CPU throttling configuration and will take full advantage of the resources available to complete the scan as fast as possible.
70+
> When you schedule scans for times when endpoints aren't in use, scans don't honor the CPU throttling configuration and takes full advantage of the resources available to complete the scan as fast as possible.
7071
7172
## Group Policy settings for scheduling remediation-required scans
7273

7374
| Location | Setting | Description | Default setting (if not configured) |
7475
|---|---|---|---|
7576
| Remediation | Specify the day of the week to run a scheduled full scan to complete remediation | Specify the day (or never) to run a scan. | Never |
76-
| Remediation | Specify the time of day to run a scheduled full scan to complete remediation | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.) | 2 a.m. |
77+
| Remediation | Specify the time of day to run a scheduled full scan to complete remediation | Specify the number of minutes after midnight (for example, enter **60** for 1 AM.) | 2 AM. |
7778

7879
## Group Policy settings for scheduling daily scans
7980

8081
| Location | Setting | Description | Default setting (if not configured) |
8182
|:---|:---|:---|:---|
8283
| Scan | Specify the interval to run quick scans per day | Specify how many hours should elapse before the next quick scan. For example, to run every two hours, enter **2**, for once a day, enter **24**. Enter **0** to never run a daily quick scan. | Never |
83-
| Scan | Specify the time for a daily quick scan | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.) Note that if this setting is set to 0, daily quick scans do not run.| 2 a.m. |
84+
| Scan | Specify the time for a daily quick scan | Specify the number of minutes after midnight (for example, enter **60** for 1 AM.) Note that if this setting is set to 0, daily quick scans don't run.| 2 AM. |
8485

8586
## Group Policy settings for scheduling scans after protection updates
8687

0 commit comments

Comments
 (0)