Skip to content

Commit 1cb228d

Browse files
committed
Learn Editor: Update microsoft-defender-antivirus-compatibility.md
1 parent b932962 commit 1cb228d

File tree

1 file changed

+6
-7
lines changed

1 file changed

+6
-7
lines changed

defender-endpoint/microsoft-defender-antivirus-compatibility.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -198,11 +198,12 @@ Defender for Endpoint affects whether Microsoft Defender Antivirus can run in pa
198198
5. When Microsoft Defender Antivirus is in passive mode, web content filtering only works with the Microsoft Edge browser.
199199

200200
> [!IMPORTANT]
201-
> - [Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-learn-about) protection continues to operate normally when Microsoft Defender Antivirus is in either active or passive mode.
202-
>
201+
- [Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-learn-about) protection continues to operate normally when Microsoft Defender Antivirus is in either active or passive mode.
202+
203203
> - Don't disable, stop, or modify any of the associated services that are used by Microsoft Defender Antivirus, Defender for Endpoint, or the Windows Security app. This recommendation includes the `wscsvc`, `SecurityHealthService`, `MsSense`, `Sense`, `WinDefend`, or `MsMpEng` services and processes. Manually modifying these services can cause severe instability on your devices and can make your network vulnerable. Disabling, stopping, or modifying those services can also cause problems when using non-Microsoft antivirus solutions and how their information is displayed in the [Windows Security app](microsoft-defender-security-center-antivirus.md).
204-
>
204+
>
205205
> - In Defender for Endpoint, you can turn EDR in block mode on, even if Microsoft Defender Antivirus isn't your primary antivirus solution. EDR in block mode detects and remediate malicious items that are found on the device (post breach). To learn more, see [EDR in block mode](edr-in-block-mode.md).
206+
Microsoft Defender for Endpoint – EDR response actions always operate in Passive mode, even if EDR is not in block mode.
206207

207208
## How to confirm the state of Microsoft Defender Antivirus
208209

@@ -215,12 +216,10 @@ You can use one of several methods to confirm the state of Microsoft Defender An
215216

216217
> [!IMPORTANT]
217218
> Beginning with [platform version 4.18.2208.0 and later](microsoft-defender-antivirus-updates.md#platform-and-engine-releases): If a server has been onboarded to Microsoft Defender for Endpoint, the "Turn off Windows Defender" [group policy](configure-endpoints-gp.md#update-endpoint-protection-configuration) setting no longer completely disables Windows Defender Antivirus on Windows Server 2012 R2 and later. Instead, it places Microsoft Defender Antivirus into passive mode. In addition, the [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) allows a switch to active mode, but not to passive mode.
218-
>
219219
> - If "Turn off Windows Defender" is already in place before onboarding to Microsoft Defender for Endpoint, Microsoft Defender Antivirus remains disabled.
220-
> - To switch Microsoft Defender Antivirus to passive mode, even if it was disabled before onboarding, you can apply the [ForceDefenderPassiveMode configuration](switch-to-mde-phase-2.md#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) with a value of `1`. To place it into active mode, switch this value to `0` instead.
221-
>
220+
- To switch Microsoft Defender Antivirus to passive mode, even if it was disabled before onboarding, you can apply the [ForceDefenderPassiveMode configuration](switch-to-mde-phase-2.md#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) with a value of `1`. To place it into active mode, switch this value to `0` instead.
221+
222222
> Note the modified logic for `ForceDefenderPassiveMode` when tamper protection is enabled: Once Microsoft Defender Antivirus is toggled to active mode, tamper protection prevents it from going back into passive mode even when `ForceDefenderPassiveMode` is set to `1`.
223-
>Microsoft Defender for Endpoint – EDR response actions always operate in Passive mode, even if EDR is in block mode.
224223
225224
### Use the Windows Security app to identify your antivirus app
226225

0 commit comments

Comments
 (0)