Skip to content

Commit 1f20c85

Browse files
committed
Update microsoft-defender-antivirus-compatibility.md
1 parent da3d41a commit 1f20c85

File tree

1 file changed

+11
-3
lines changed

1 file changed

+11
-3
lines changed

defender-endpoint/microsoft-defender-antivirus-compatibility.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,14 @@ description: Learn about Microsoft Defender Antivirus with other security produc
44
ms.service: defender-endpoint
55
ms.subservice: ngp
66
ms.localizationpriority: medium
7-
ms.date: 12/12/2023
7+
ms.date: 04/26/2024
88
ms.topic: conceptual
99
author: siosulli
1010
ms.author: siosulli
11-
ms.custom: nextgen
12-
ms.reviewer: mkaminska, pahuijbr
11+
ms.custom:
12+
- nextgen
13+
- partner-contribution
14+
ms.reviewer: pahuijbr, dmcwee
1315
manager: deniseb
1416
ms.collection:
1517
- m365-security
@@ -105,6 +107,12 @@ You can view your protection status in PowerShell by using the command [Get-MpCo
105107

106108
For passive mode to work on endpoints running Windows Server 2016 and Windows Server 2012 R2, those endpoints must be onboarded with the modern, unified solution described in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2012-r2-and-windows-server-2016).
107109

110+
111+
> [!IMPORTANT]
112+
> Beginning with [platform version 4.18.2208.0 and later](/defender-endpoint/msda-updates-previous-versions-technical-upgrade-support#september-2022-platform-41822097--engine-11197003), if a server is onboarded to Microsoft Defender for Endpoint, [tamper protection](/editor/MicrosoftDocs/microsoft-365-docs-pr/microsoft-365%2Fsecurity%2Fdefender-endpoint%2Fmicrosoft-defender-antivirus-compatibility.md/main/9a5f8a9f-f5b9-cd00-0d21-171936a25b2b/prevent-changes-to-security-settings-with-tamper-protection.md) allows a switch to active mode, but not to passive mode.
113+
>
114+
> Note the modified logic for `ForceDefenderPassiveMode` when tamper protection is enabled: Once Microsoft Defender Antivirus is set to active mode, tamper protection prevents it from going back into passive mode even when `ForceDefenderPassiveMode` is set to `1`.
115+
108116
On Windows Server 2016, Windows Server 2012 R2, Windows Server version 1803 or newer, Windows Server 2019, and Windows Server 2022, if you're using a non-Microsoft antivirus product on an endpoint that *isn't* onboarded to Microsoft Defender for Endpoint, disable/uninstall Microsoft Defender Antivirus manually to prevent problems caused by having multiple antivirus products installed on a server. However, Defender for Endpoint includes capabilities that further extend the antivirus protection that is installed on your endpoint. If you have Defender for Endpoint, you can benefit from running Microsoft Defender Antivirus alongside another antivirus solution.
109117

110118
For example, [Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md) provides added protection from malicious artifacts even if Microsoft Defender Antivirus isn't the primary antivirus product. Such capabilities require Microsoft Defender Antivirus to be installed and running in passive mode or active mode.

0 commit comments

Comments
 (0)