You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> For a detailed overview of suppressions, submissions, and exclusions across Microsoft Defender Antivirus and Defender for Endpoint, see [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
38
38
39
+
## Hide the antivirus exclusions from users and/or local administrators
40
+
41
+
| Setting | Description | Default value |
42
+
| -------- | -------- | -------- |
43
+
|**Configure if exclusions are visible to Local Admins**| - **Disabled (Default)**: If you disable or don't configure this setting, Local Admins are able to see exclusions in the Windows Security App or via PowerShell. <br> - **Enabled**: If this setting is enabled, Local Admins no longer see the exclusion list in Windows Security App or via PowerShell. <br> - Please note that applying this setting won't remove exclusions, it prevents them from being visible to Local Admins. This is reflected in Get-MpPreference. <br> | Disabled |
44
+
|**Configure whether exclusions are visible to local users**| - Use this policy setting to configure whether or not exclusions are visible to Local Admins (HideExclusionsFromLocalAdmins). | Disabled |
If you're using Microsoft Intune to manage Microsoft Defender Antivirus or Microsoft Defender for Endpoint, use the following procedures to define exclusions:
46
53
47
54
-[Configure custom exclusions for Microsoft Defender Antivirus](#configure-custom-exclusions-for-microsoft-defender-antivirus)
55
+
-[Hide the antivirus exclusions from users and/or local administrators.](#hide-the-antivirus-exclusions-from-users-andor-local-administrators)
48
56
-[Configure and validate exclusions](#configure-and-validate-exclusions)
49
57
-[Manage antivirus exclusions in Intune (for existing policies)](#manage-antivirus-exclusions-in-intune-for-existing-policies)
50
58
-[Create a new antivirus policy with exclusions in Intune](#create-a-new-antivirus-policy-with-exclusions-in-intune)
51
59
-[Important points about exclusions](#important-points-about-exclusions)
52
60
-[Audit antivirus exclusions on Exchange systems](#audit-antivirus-exclusions-on-exchange-systems)
61
+
-[See also](#see-also)
53
62
54
63
If you're using another tool, such as Configuration Manager or Group Policy, or you want more detailed information about custom exclusions, see these articles:
55
64
@@ -114,7 +123,7 @@ Remember these important points:
114
123
115
124
## Audit antivirus exclusions on Exchange systems
116
125
117
-
Microsoft Exchange has supported integration with the Antimalware Scan Interface (AMSI) since the June 2021 Quarterly Updates for Exchange (see [Running Windows antivirus software on Exchange servers](/exchange/antispam-and-antimalware/windows-antivirus-software)). It's highly recommended to install these updates and make sure that AMSI is working properly. See [Microsoft Defender Antivirus security intelligence and product updates](microsoft-defender-antivirus-updates.md).
126
+
Microsoft Exchange has supported integration with the anti-malware Scan Interface (AMSI) since the June 2021 Quarterly Updates for Exchange (see [Running Windows antivirus software on Exchange servers](/exchange/antispam-and-antimalware/windows-antivirus-software)). It's highly recommended to install these updates and make sure that AMSI is working properly. See [Microsoft Defender Antivirus security intelligence and product updates](microsoft-defender-antivirus-updates.md).
118
127
119
128
Many organizations exclude the Exchange directories from antivirus scans for performance reasons. Microsoft recommends auditing Microsoft Defender Antivirus exclusions on Exchange systems and assessing whether exclusions can be removed without impacting performance in your environment to ensure the highest level of protection. Exclusions can be managed by using Group Policy, PowerShell, or systems management tools like Microsoft Intune.
Copy file name to clipboardExpand all lines: defender-endpoint/manage-outdated-endpoints-microsoft-defender-antivirus.md
+25-8Lines changed: 25 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Apply Microsoft Defender Antivirus protection updates to out of date endpoints
3
-
description: Define when and how updates should be applied for endpoints that haven't updated in a while.
3
+
description: Define when and how updates should be applied for out of date endpoints in Microsoft Defender Antivirus.
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
6
ms.topic: conceptual
@@ -14,7 +14,7 @@ ms.collection:
14
14
- m365-security
15
15
- tier3
16
16
search.appverid: met150
17
-
ms.date: 04/08/2021
17
+
ms.date: 02/18/2025
18
18
---
19
19
20
20
# Manage Microsoft Defender Antivirus updates and scans for endpoints that are out of date
@@ -45,7 +45,7 @@ You can use one of several methods to set up catch-up protection updates:
45
45
46
46
### Use Configuration Manager to configure catch-up protection updates
47
47
48
-
1. On your Microsoft Configuration Manager console, open the antimalware policy you want to change (select **Assets and Compliance** in the navigation pane on the left, then expand the tree to **Overview**\>**Endpoint Protection**\>**Antimalware Policies**)
48
+
1. On your Microsoft Configuration Manager console, open the anti-malware policy you want to change (select **Assets and Compliance** in the navigation pane on the left, then expand the tree to **Overview**\>**Endpoint Protection**\>**Antimalware Policies**)
49
49
50
50
2. Go to the **Security intelligence updates** section and configure the following settings:
51
51
@@ -58,7 +58,7 @@ You can use one of several methods to set up catch-up protection updates:
58
58
59
59
### Use Group Policy to enable and configure the catch-up update feature
60
60
61
-
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and then select **Edit**.
61
+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)). Right-click the Group Policy Object you want to configure and then select **Edit**.
62
62
63
63
2. In the **Group Policy Management Editor** go to **Computer configuration**.
64
64
@@ -119,9 +119,9 @@ You can use Group Policy to specify the number of days after which endpoint prot
119
119
120
120
4. Select **OK**.
121
121
122
-
## Set up catch-up scans for endpoints that have not been scanned for a while
122
+
## Set up catch-up scans for endpoints that haven't been scanned for a while
123
123
124
-
You can set the number of consecutive scheduled scans that can be missed before Microsoft Defender Antivirus will force a scan.
124
+
You can set the number of consecutive scheduled scans that can be missed before Microsoft Defender Antivirus forces a scan.
125
125
126
126
The process for enabling this feature is:
127
127
@@ -145,7 +145,7 @@ You can use one of several methods to set up catch-up scans:
145
145
146
146
### Use Group Policy to enable and configure the catch-up scan feature
147
147
148
-
1. Ensure you have set up at least one scheduled scan.
148
+
1. Ensure you set up at least one scheduled scan.
149
149
150
150
2. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**.
151
151
@@ -193,14 +193,31 @@ See the following article for more information and allowed parameters:
193
193
194
194
### Use Configuration Manager to configure catch-up scans
195
195
196
-
1. On your Microsoft Configuration Manager console, open the antimalware policy you want to change (select **Assets and Compliance** in the navigation pane on the left, then expand the tree to **Overview**\>**Endpoint Protection**\>**Antimalware Policies**)
196
+
1. On your Microsoft Configuration Manager console, open the anti-malware policy you want to change (select **Assets and Compliance** in the navigation pane on the left, then expand the tree to **Overview**\>**Endpoint Protection**\>**Antimalware Policies**)
197
197
198
198
2. Go to the **Scheduled scans** section and **Force a scan of the selected scan type if client computer is offline...** to **Yes**.
199
199
200
200
3. Select **OK**.
201
201
202
202
4.[Deploy the updated policy as usual](/sccm/protect/deploy-use/endpoint-antimalware-policies#deploy-an-antimalware-policy-to-client-computers).
203
203
204
+
### Use Group Policy to configure security intelligence updates over a metered connection
205
+
206
+
1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**.
207
+
208
+
1. In the **Group Policy Management Editor**, go to **Computer configuration**.
209
+
210
+
1. Select **Policies** and then select **Administrative templates**.
211
+
212
+
1. Expand the tree to **Windows components > Microsoft Defender Antivirus > Security Intelligence Update** and configure the following settings:
213
+
214
+
- If you have set up scheduled quick scans, double-click the Allow Microsoft Defender Antivirus to update and communicate over a metered connection setting and set the option to **Enabled**.
215
+
- Select **OK**.
216
+
217
+
|Settings| Description| Default |
218
+
| -------- | -------- | -------- |
219
+
|Allow Microsoft Defender Antivirus to update and communicate over a metered connection.|Enabling this policy will automatically download updates, even over metered data connections (charges may apply)| Disabled |
220
+
204
221
> [!TIP]
205
222
> If you're looking for Antivirus related information for other platforms, see:
206
223
> -[Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-mac.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,7 +79,7 @@ These three most recent major releases of macOS are supported.
79
79
- Beta versions of macOS aren't supported.
80
80
81
81
> [!IMPORTANT]
82
-
> On macOS 11 (Large Sur) and later, Microsoft Defender for Endpoint requires more configuration profiles. If you're an existing customer upgrading from earlier versions of macOS, make sure to deploy the extra configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md) and detailed in [installation instructions](#installation-instructions).
82
+
> On macOS 11 (Big Sur) and later, Microsoft Defender for Endpoint requires more configuration profiles. If you're an existing customer upgrading from earlier versions of macOS, make sure to deploy the extra configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md) and detailed in [installation instructions](#installation-instructions).
83
83
84
84
After you've enabled the service, you might need to configure your network or firewall to allow outbound connections between it and your endpoints.
Copy file name to clipboardExpand all lines: defender-endpoint/schedule-antivirus-scans-group-policy.md
+12-11Lines changed: 12 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
6
6
author: emmwalshh
7
7
ms.author: ewalsh
8
8
ms.custom: nextgen
9
-
ms.date: 09/07/2024
9
+
ms.date: 02/18/2025
10
10
ms.reviewer: pauhijbr, ksarens
11
11
manager: deniseb
12
12
ms.subservice: ngp
@@ -37,27 +37,28 @@ This article describes how to configure scheduled scans using Group Policy. To l
37
37
38
38
2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
39
39
40
-
3. Specify settings for the Group Policy Object, and then select **OK**.
40
+
3. Specify the settings for the Group Policy Object, and then select **OK**.
41
41
42
42
4. Repeat steps 1-4 for each setting you want to configure.
43
43
44
44
5. Deploy your Group Policy Object as you normally do. If you need help with Group Policy Objects, see [Create a Group Policy Object](/windows/security/threat-protection/windows-firewall/create-a-group-policy-object).
45
45
46
46
> [!NOTE]
47
-
> When configuring scheduled scans, the setting **Start the scheduled scan only when computer is on but not in use**, which is enabled by default, can impact the expected scheduled time by requiring the machine to be idle first.
47
+
> When configuring scheduled scans, the setting **Start the scheduled scan only when computer is on but not in use** (which is enabled by default) can affect the expected scheduled time by requiring the machine to be idle first.
48
48
>
49
-
> For weekly scans, default behavior on Windows Server is to scan outside of automatic maintenance when the machine is idle. The default on Windows 10 and later is to scan during automatic maintenance when the machine is idle. To change this behavior, modify the settings by disabling **ScanOnlyIfIdle**, and then define a schedule.
49
+
> For weekly scans, the default behavior on Windows Server and Windows 10 and later, is to scan outside of the automatic maintenance when the machine is idle. To change this behavior, modify the settings by disabling **ScanOnlyIfIdle**, and then define a schedule.
50
50
51
-
For more information, see the [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md) and [Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)topics.
51
+
For more information, see the [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md) and [Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)articles.
| Scan | Specify the scan type to use for a scheduled scan | Quick scan |
57
+
| Scan | Specify the scan type to use for a scheduled scan | Quick scan ||
58
58
| Scan | Specify the day of the week to run a scheduled scan | Specify the day (or never) to run a scan. | Never |
59
-
| Scan | Specify the time of day to run a scheduled scan | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.). | 2 a.m. |
60
-
| Root | Randomize scheduled task times |In Microsoft Defender Antivirus, randomize the start time of the scan to any interval from 0 to 23 hours. By default, scheduled tasks begin at a random time within four hours of the time specified in Task Scheduler. | Enabled |
59
+
| Scan | Specify the time of day to run a scheduled scan | Specify the number of minutes after midnight to run a scan (for example, enter **60** for 1 AM). | 2 AM. |
60
+
| Root | Randomize scheduled task times |In Microsoft Defender Antivirus, randomize the start time of the scan to any interval from **0 to 23 hours**. By default, scheduled tasks begin at a random time within four hours of the time specified in Task Scheduler. | Enabled |
61
+
| Root | Configure scheduled task times randomization window |- This setting lets you set the start time for scheduled task scans and security updates. <br> - When enabled, you can choose a randomization window between **1 and 23 hours**. <br> - The Randomize Scheduled Task Times uses the specified window. <br> - If disabled or not configured, it randomizes times between **0 and 4 hours**. | Not configured (Disabled)|
61
62
62
63
## Group Policy settings for scheduling scans for when an endpoint isn't in use
63
64
@@ -66,21 +67,21 @@ For more information, see the [Manage when protection updates should be download
66
67
| Scan | Start the scheduled scan only when computer is on but not in use | Scheduled scans won't run, unless the computer is on but not in use | Enabled |
67
68
68
69
> [!NOTE]
69
-
> When you schedule scans for times when endpoints aren't in use, scans don't honor the CPU throttling configuration and will take full advantage of the resources available to complete the scan as fast as possible.
70
+
> When you schedule scans for times when endpoints aren't in use, scans don't honor the CPU throttling configuration and takes full advantage of the resources available to complete the scan as fast as possible.
70
71
71
72
## Group Policy settings for scheduling remediation-required scans
| Remediation | Specify the day of the week to run a scheduled full scan to complete remediation | Specify the day (or never) to run a scan. | Never |
76
-
| Remediation | Specify the time of day to run a scheduled full scan to complete remediation | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.) | 2 a.m. |
77
+
| Remediation | Specify the time of day to run a scheduled full scan to complete remediation | Specify the number of minutes after midnight (for example, enter **60** for 1 AM.) | 2 AM. |
77
78
78
79
## Group Policy settings for scheduling daily scans
| Scan | Specify the interval to run quick scans per day | Specify how many hours should elapse before the next quick scan. For example, to run every two hours, enter **2**, for once a day, enter **24**. Enter **0** to never run a daily quick scan. | Never |
83
-
| Scan | Specify the time for a daily quick scan | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.) Note that if this setting is set to 0, daily quick scans do not run.| 2 a.m. |
84
+
| Scan | Specify the time for a daily quick scan | Specify the number of minutes after midnight (for example, enter **60** for 1 AM.) Note that if this setting is set to 0, daily quick scans don't run.| 2 AM. |
84
85
85
86
## Group Policy settings for scheduling scans after protection updates
0 commit comments