You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/defender-antivirus-compatibility-without-mde.md
+9-1Lines changed: 9 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
6
6
ms.reviewer: yongrhee
7
7
ms.service: defender-endpoint
8
8
ms.topic: conceptual
9
-
ms.date: 01/06/2025
9
+
ms.date: 01/23/2025
10
10
ms.subservice: ngp
11
11
search.appverid: met150
12
12
ms.localizationpriority: medium
@@ -67,12 +67,20 @@ gsv WinDefend, WdBoot, WdFilter, WdNisSvc, WdNisDrv | ft -auto DisplayName, Name
67
67
68
68
**A:** We don't support the manual modification of the start type of the services and drivers for Microsoft Defender Antivirus in Windows images. On Windows clients, the supported method is by your non-Microsoft antivirus registering in Windows Security Center (WSC) api. Or, on Windows Server, you can uninstall the Microsoft Defender Antivirus feature by using roles and features MMC or by running the following PowerShell command (as an administrator):
69
69
70
+
Windows Server 2019 and newer
70
71
```powershell
71
72
72
73
Uninstall-WindowsFeature Windows-Defender
73
74
74
75
```
75
76
77
+
Windows Server 2016
78
+
```powershell
79
+
80
+
Uninstall-WindowsFeature Windows-Defender
81
+
Uninstall-WindowsFeature Windows-Defender-Gui
82
+
```
83
+
76
84
**Q:** Can I use Microsoft Defender Antivirus in passive mode without onboarding to Microsoft Defender for Endpoint?
77
85
78
86
**A:** No. Passive mode is a functionality in Microsoft Defender for Endpoint Plan 2.
Copy file name to clipboardExpand all lines: defender-endpoint/indicator-certificates.md
+15-13Lines changed: 15 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: asr
17
17
search.appverid: met150
18
-
ms.date: 07/31/2024
18
+
ms.date: 01/23/2025
19
19
---
20
20
21
21
# Create indicators based on certificates
@@ -33,28 +33,28 @@ ms.date: 07/31/2024
33
33
34
34
You can create indicators for certificates. Some common use cases include:
35
35
36
-
- Scenarios when you need to deploy blocking technologies, such as [attack surface reduction rules](attack-surface-reduction.md) but need to allow behaviors from signed applications by adding the certificate in the allow list.
37
-
- Blocking the use of a specific signed application across your organization. By creating an indicator to block the certificate of the application, Windows Defender AV will prevent file executions (block and remediate) and the Automated Investigation and Remediation behave the same.
36
+
- Scenarios when you need to deploy blocking technologies, such as [attack surface reduction rules](attack-surface-reduction.md) but need to allow behaviors from signed applications by adding the certificate in the allowlist.
37
+
- Blocking the use of a specific signed application across your organization. By creating an indicator to block the certificate of the application, Microsoft Defender Antivirus prevents file executions (block and remediate), and automated investigation and remediation behaves the same.
38
38
39
39
## Before you begin
40
40
41
-
It's important to understand the following requirements prior to creating indicators for certificates:
41
+
It's important to understand the following requirements before creating indicators for certificates:
42
42
43
-
- This feature is available if your organization uses Microsoft Defender Antivirus and Cloud-based protection is enabled. For more information, see [Manage cloud-based protection](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus).
44
-
- The Antimalware client version must be 4.18.1901.x or later.
43
+
- This feature is available if your organization uses Microsoft Defender Antivirus (in active mode) and cloud-based protection is enabled. For more information, see [Manage cloud-based protection](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus).
44
+
- The anti-malware client version must be `4.18.1901.x` or later.
45
45
- Supported on machines on Windows 10, version 1703 or later, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, and Windows Server 2022.
46
46
47
47
> [!NOTE]
48
-
> Windows Server 2016 and Windows Server 2012 R2 will need to be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2016-and-windows-server-2012-r2) for this feature to work.
48
+
> Windows Server 2016 and Windows Server 2012 R2 must be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2016-and-windows-server-2012-r2) for this feature to work.
49
49
50
50
- The virus and threat protection definitions must be up to date.
51
51
- This feature currently supports entering .CER or .PEM file extensions.
52
52
53
53
> [!IMPORTANT]
54
54
>
55
55
> - A valid leaf certificate is a signing certificate that has a valid certification path and must be chained to the Root Certificate Authority (CA) trusted by Microsoft. Alternatively, a custom (self-signed) certificate can be used as long as it's trusted by the client (Root CA certificate is installed under the Local Machine 'Trusted Root Certification Authorities').
56
-
> - The children or parent of the allow/block certificate IOCs are not included in the allow/block IoC functionality, only leaf certificates are supported.
57
-
> - Microsoft signed certificates cannot be blocked.
56
+
> - The children or parent of the allow/block certificate IOCs aren't included in the allow/block IoC functionality, only leaf certificates are supported.
57
+
> - Microsoft signed certificates can't be blocked.
58
58
59
59
## Create an indicator for certificates from the settings page:
60
60
@@ -66,11 +66,12 @@ It's important to understand the following requirements prior to creating indica
66
66
2. Select **Add indicator**.
67
67
68
68
3. Specify the following details:
69
-
- Indicator - Specify the entity details and define the expiration of the indicator.
70
-
- Action - Specify the action to be taken and provide a description.
71
-
- Scope - Define the scope of the machine group.
72
69
73
-
4. Review the details in the Summary tab, then click **Save**.
70
+
-**Indicator**: Specify the entity details and define the expiration of the indicator.
71
+
-**Action**: Specify the action to be taken and provide a description.
72
+
-**Scope**: Define the scope of the machine group.
73
+
74
+
4. Review the details on the **Summary** tab, and then select **Save**.
74
75
75
76
## Related articles
76
77
@@ -79,4 +80,5 @@ It's important to understand the following requirements prior to creating indica
79
80
-[Create indicators for IPs and URLs/domains](indicator-ip-domain.md)
80
81
-[Manage indicators](indicator-manage.md)
81
82
-[Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
83
+
82
84
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments