You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-server-exclusions-microsoft-defender-antivirus.md
+15-22Lines changed: 15 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ description: Windows Server includes automatic exclusions, based on server role.
6
6
ms.service: defender-endpoint
7
7
ms.subservice: ngp
8
8
ms.localizationpriority: medium
9
-
ms.date: 03/28/2025
9
+
ms.date: 05/01/2025
10
10
author: emmwalshh
11
11
ms.author: ewalsh
12
12
ms.topic: conceptual
@@ -30,21 +30,17 @@ search.appverid: met150
30
30
31
31
- Windows Server
32
32
33
+
## Important notes about automatic exclusions on Windows Server
33
34
34
-
> [!IMPORTANT]
35
-
> ## Important notes about automatic exclusions on Windows Server
36
-
>
37
-
> -[Custom exclusions](configure-exclusions-microsoft-defender-antivirus.md) take precedence over automatic exclusions. When a custom exclusion is set for a path that also has a duplicate automatic or built-in exclusion, the custom exclusion will always apply.
38
-
> - Automatic exclusions only apply to [real-time protection (RTP)](configure-protection-features-microsoft-defender-antivirus.md) scanning. Other scan activity, for example [Network Inspection](network-protection.md) and [Behavior Monitoring](behavior-monitor.md), will not be excluded. To exclude other scan types, please use custom exclusions.
39
-
> - Automatic exclusions aren't honored during a [quick scan, full scan, and custom scan](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan). To exclude other scan types, please use custom exclusions.
40
-
> - Built-in exclusions and automatic server role exclusions don't appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md).
41
-
> - Microsoft Defender Antivirus uses the Deployment Image Servicing and Management (DISM) tools to determine which roles are installed on your computer.
42
-
> - Appropriate exclusions must be set for software that isn't included with the operating system.
43
-
> - The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes. This article lists some, but not all, of the built-in and automatic exclusions.
35
+
-[Custom exclusions](configure-exclusions-microsoft-defender-antivirus.md) take precedence over automatic exclusions. When a custom exclusion is set for a path that also has a duplicate automatic or built-in exclusion, the custom exclusion will always apply.
36
+
- Automatic exclusions only apply to [real-time protection (RTP)](configure-protection-features-microsoft-defender-antivirus.md) scanning. Other scan activity, for example [Network Inspection](network-protection.md) and [Behavior Monitoring](behavior-monitor.md), will not be excluded. To exclude other scan types, please use custom exclusions.
37
+
- Automatic exclusions aren't honored during a [quick scan, full scan, and custom scan](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan). To exclude other scan types, please use custom exclusions.
38
+
- Built-in exclusions and automatic server role exclusions don't appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md).
39
+
- Microsoft Defender Antivirus uses the Deployment Image Servicing and Management (DISM) tools to determine which roles are installed on your computer.
40
+
- Appropriate exclusions must be set for software that isn't included with the operating system.
41
+
- The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes.
44
42
45
-
## Overview
46
-
47
-
This article describes types of exclusions that you don't have to define for Microsoft Defender Antivirus:
43
+
This article describes the two main types of exclusions that you don't have to define for Microsoft Defender Antivirus:
48
44
49
45
-[Automatic exclusions](#automatic-server-role-exclusions) for roles on Windows Server 2016 and later.
50
46
-[Built-in exclusions](#built-in-exclusions) for operating system files on all versions of Windows.
@@ -240,10 +236,9 @@ This section lists the folder exclusions that are delivered automatically when y
240
236
241
237
## Built-in exclusions
242
238
243
-
> [!NOTE]
244
-
> - Please see [Important Notes](#important-notes-about-automatic-exclusions-on-windows-server)
245
-
> - Default locations could be different than the locations that are described in this article.
246
-
> - The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes. This article lists some, but not all, of the built-in exclusions.
239
+
Make sure to review [Important notes about automatic exclusions](#important-notes-about-automatic-exclusions-on-windows-server) (in this article). Keep in mind that default locations could be different than the locations that are described in this article.
240
+
241
+
The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes. This article lists some, but not all, of the built-in exclusions.
247
242
248
243
Because Microsoft Defender Antivirus is built into Windows, it doesn't require exclusions for operating system files on any version of Windows.
249
244
@@ -396,9 +391,7 @@ If necessary, you can add or remove custom exclusions. To do that, see the follo
396
391
-[Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
397
392
-[Common mistakes to avoid when defining exclusions](common-exclusion-mistakes-microsoft-defender-antivirus.md)
398
393
-[Customize, initiate, and review the results of Microsoft Defender Antivirus scans and remediation](customize-run-review-remediate-scans-microsoft-defender-antivirus.md)
399
-
-[Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
400
-
-[Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
401
-
-[Configure Defender for Endpoint on Android features](android-configure.md)
402
-
-[Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
394
+
-[Onboard client devices running Windows or macOS to Microsoft Defender for Endpoint](onboard-client.md)
395
+
-[Onboard servers through Microsoft Defender for Endpoint's onboarding experience](onboard-server.md)
403
396
404
397
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
- tier2
17
17
- mde-ngp
18
18
search.appverid: met150
19
-
ms.date: 04/01/2025
19
+
ms.date: 05/01/2025
20
20
---
21
21
22
22
# Detect and block potentially unwanted applications
@@ -193,7 +193,7 @@ get-mpPreference | ft PUAProtection
193
193
| -------- | -------- |
194
194
|`0`| PUA Protection off (Default). Microsoft Defender Antivirus won't protect against potentially unwanted applications. |
195
195
|`1`| PUA Protection on. Detected items are blocked. They'll show in history along with other threats.|
196
-
|`2`| Audit mode. Microsoft Defender Antivirus detects potentially unwanted applications but take no action. You can review information about the applications Windows Defender would've taken action against by searching for events created by Windows Defender in the Event Viewer.|
196
+
|`2`| Audit mode. Microsoft Defender Antivirus detects potentially unwanted applications but takes no action. You can review information about the applications Microsoft Defender Antivirus would've taken action against by searching for events created by Microsoft Defender Antivirus in the Event Viewer, but not in the [Microsoft Defender portal](https://security.microsoft.com).|
197
197
198
198
For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/index).
# EDR detection test for verifying device's onboarding and reporting services
@@ -32,13 +32,11 @@ ms.date: 03/04/2025
32
32
- Linux servers must be running a supported version (see [Prerequisites for Microsoft Defender for Endpoint on Linux](mde-linux-prerequisites.md))
33
33
- Devices must be onboarded to Defender for Endpoint
34
34
35
-
Endpoint detection and response for Endpoint provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats.
36
-
37
-
Run an EDR detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
35
+
Endpoint detection and response for Endpoint provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats. You can run an EDR detection test to verify that the device is properly onboarded and reporting to the service. This article describes how to run an EDR detection test on a newly onboarded device.
38
36
39
37
### Windows
40
38
41
-
1. Open a Command Prompt window
39
+
1. Open a Command Prompt window.
42
40
43
41
2. At the prompt, copy and run the following command. The Command Prompt window closes automatically.
44
42
@@ -50,35 +48,35 @@ Run an EDR detection test to verify that the device is properly onboarded and re
50
48
51
49
### Linux
52
50
53
-
1. Download [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server
54
-
51
+
1. Download [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server.
3.And run the following command to give the script executable permission:
63
+
3.Run the following command to give the script executable permission:
67
64
68
-
```bash
69
-
chmod +x ./mde_linux_edr_diy.sh
70
-
```
65
+
```bash
66
+
chmod +x ./mde_linux_edr_diy.sh
67
+
```
71
68
72
69
4. Run the following command to execute the script:
73
-
```bash
74
-
./mde_linux_edr_diy.sh
75
-
```
76
70
77
-
5. After a few minutes, a detection should be raised in Microsoft Defender XDR. Look at the alert details, machine timeline, and perform your typical investigation steps.
71
+
```bash
72
+
./mde_linux_edr_diy.sh
73
+
```
74
+
75
+
After a few minutes, a detection should be raised in the [Microsoft Defender portal](https://security.microsoft.com). Look at the alert details, machine timeline, and perform your typical investigation steps.
78
76
79
77
### macOS
80
78
81
-
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.
79
+
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract the zipped folder.
:::image type="content" source="media/b8db76c2-c368-49ad-970f-dcb87534d9be.png" alt-text="Screenshot that shows a macOS EDR test alert that shows severity, category, detection source, and a collapsed menu of actions":::
126
124
127
-
The macOS EDR test alert shows severity, category, detection source, and a collapsed menu of actions.
128
-
129
-
Look at the alert details and the device timeline, and perform the regular investigation steps.
125
+
The macOS EDR test alert shows severity, category, detection source, and a collapsed menu of actions. Look at the alert details and the device timeline, and perform the regular investigation steps.
Copy file name to clipboardExpand all lines: defender-endpoint/enable-update-mdav-to-latest-ws.md
+20-8Lines changed: 20 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
6
6
author: emmwalshh
7
7
ms.reviewer: yongrhee
8
8
ms.localizationpriority: high
9
-
ms.date: 03/14/2025
9
+
ms.date: 05/01/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -27,14 +27,22 @@ search.appverid: met150
27
27
- Microsoft Defender for Servers Plan 1 or Plan 2
28
28
- Microsoft Defender Antivirus
29
29
30
-
If you wish to use Microsoft Defender Antivirus on your Windows Server, and it had been previously disabled or uninstalled, you may need to take further steps to re-enable it and ensure it's fully updated.
30
+
This article describes how to enable and update Microsoft Defender Antivirus on Windows Server. You'd use the procedures in this article if Microsoft Defender Antivirus was previously disabled or uninstalled.
31
31
32
-
To enable and update Microsoft Defender Antivirus on Windows Server, perform the following steps:
32
+
## Enable and update Microsoft Defender Antivirus on Windows Server
33
+
34
+
35
+
1. Install the latest [servicing stack updates](/windows/deployment/update/servicing-stack-updates).
36
+
37
+
2. Install the latest [cumulative update](/windows/deployment/update/catalog-checkpoint-cumulative-updates).
38
+
39
+
3. Reinstall Microsoft Defender Antivirus or re-enable it. See the following sections (in this article):
40
+
41
+
-[Re-enable Microsoft Defender Antivirus on Windows Server if it was disabled](#re-enable-microsoft-defender-antivirus-on-windows-server-if-it-was-disabled)
42
+
-[Re-enable Microsoft Defender Antivirus on Windows Server if it was uninstalled](#re-enable-microsoft-defender-antivirus-on-windows-server-if-it-was-uninstalled)
33
43
34
-
1. Install the latest Servicing Stack Update (SSU).
35
-
2. Install the latest cumulative update (LCU).
36
-
3. Reinstall Microsoft Defender Antivirus or re-enable it. For more information on how to reinstall or re-enable Microsoft Defender Antivirus on Windows Server, see [Re-enable Microsoft Defender Antivirus on Windows Server if it was disabled](#re-enable-microsoft-defender-antivirus-on-windows-server-if-it-was-disabled) and [Re-enable Microsoft Defender Antivirus on Windows Server if it was uninstalled](#re-enable-microsoft-defender-antivirus-on-windows-server-if-it-was-uninstalled).
37
44
4. Reboot the system.
45
+
38
46
5. Install the latest version of the platform update.
39
47
40
48
> [!NOTE]
@@ -53,8 +61,11 @@ On Windows Server 2016, in some cases, you may need to use the [Malware Protecti
53
61
As a local administrator on the server, perform the following steps:
Copy file name to clipboardExpand all lines: defender-endpoint/uefi-scanning-in-defender-for-endpoint.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: UEFI scanning in Defender for Endpoint
2
+
title: Firmware (UEFI) scanning in Defender for Endpoint
3
3
description: Learn how Microsoft Defender for Endpoint is extending its protection capabilities to the firmware level with a new Unified Extensible Firmware Interface (UEFI) scanner.
0 commit comments