Skip to content

Commit 20d4014

Browse files
Merge pull request #3640 from MicrosoftDocs/main
[AutoPublish] main to live - 05/01 22:32 PDT | 05/02 11:02 IST
2 parents 0bc3f38 + 2da8036 commit 20d4014

5 files changed

+65
-64
lines changed

defender-endpoint/configure-server-exclusions-microsoft-defender-antivirus.md

Lines changed: 15 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: Windows Server includes automatic exclusions, based on server role.
66
ms.service: defender-endpoint
77
ms.subservice: ngp
88
ms.localizationpriority: medium
9-
ms.date: 03/28/2025
9+
ms.date: 05/01/2025
1010
author: emmwalshh
1111
ms.author: ewalsh
1212
ms.topic: conceptual
@@ -30,21 +30,17 @@ search.appverid: met150
3030

3131
- Windows Server
3232

33+
## Important notes about automatic exclusions on Windows Server
3334

34-
> [!IMPORTANT]
35-
> ## Important notes about automatic exclusions on Windows Server
36-
>
37-
> - [Custom exclusions](configure-exclusions-microsoft-defender-antivirus.md) take precedence over automatic exclusions. When a custom exclusion is set for a path that also has a duplicate automatic or built-in exclusion, the custom exclusion will always apply.
38-
> - Automatic exclusions only apply to [real-time protection (RTP)](configure-protection-features-microsoft-defender-antivirus.md) scanning. Other scan activity, for example [Network Inspection](network-protection.md) and [Behavior Monitoring](behavior-monitor.md), will not be excluded. To exclude other scan types, please use custom exclusions.
39-
> - Automatic exclusions aren't honored during a [quick scan, full scan, and custom scan](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan). To exclude other scan types, please use custom exclusions.
40-
> - Built-in exclusions and automatic server role exclusions don't appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md).
41-
> - Microsoft Defender Antivirus uses the Deployment Image Servicing and Management (DISM) tools to determine which roles are installed on your computer.
42-
> - Appropriate exclusions must be set for software that isn't included with the operating system.
43-
> - The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes. This article lists some, but not all, of the built-in and automatic exclusions.
35+
- [Custom exclusions](configure-exclusions-microsoft-defender-antivirus.md) take precedence over automatic exclusions. When a custom exclusion is set for a path that also has a duplicate automatic or built-in exclusion, the custom exclusion will always apply.
36+
- Automatic exclusions only apply to [real-time protection (RTP)](configure-protection-features-microsoft-defender-antivirus.md) scanning. Other scan activity, for example [Network Inspection](network-protection.md) and [Behavior Monitoring](behavior-monitor.md), will not be excluded. To exclude other scan types, please use custom exclusions.
37+
- Automatic exclusions aren't honored during a [quick scan, full scan, and custom scan](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan). To exclude other scan types, please use custom exclusions.
38+
- Built-in exclusions and automatic server role exclusions don't appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md).
39+
- Microsoft Defender Antivirus uses the Deployment Image Servicing and Management (DISM) tools to determine which roles are installed on your computer.
40+
- Appropriate exclusions must be set for software that isn't included with the operating system.
41+
- The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes.
4442

45-
## Overview
46-
47-
This article describes types of exclusions that you don't have to define for Microsoft Defender Antivirus:
43+
This article describes the two main types of exclusions that you don't have to define for Microsoft Defender Antivirus:
4844

4945
- [Automatic exclusions](#automatic-server-role-exclusions) for roles on Windows Server 2016 and later.
5046
- [Built-in exclusions](#built-in-exclusions) for operating system files on all versions of Windows.
@@ -240,10 +236,9 @@ This section lists the folder exclusions that are delivered automatically when y
240236

241237
## Built-in exclusions
242238

243-
> [!NOTE]
244-
> - Please see [Important Notes](#important-notes-about-automatic-exclusions-on-windows-server)
245-
> - Default locations could be different than the locations that are described in this article.
246-
> - The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes. This article lists some, but not all, of the built-in exclusions.
239+
Make sure to review [Important notes about automatic exclusions](#important-notes-about-automatic-exclusions-on-windows-server) (in this article). Keep in mind that default locations could be different than the locations that are described in this article.
240+
241+
The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes. This article lists some, but not all, of the built-in exclusions.
247242

248243
Because Microsoft Defender Antivirus is built into Windows, it doesn't require exclusions for operating system files on any version of Windows.
249244

@@ -396,9 +391,7 @@ If necessary, you can add or remove custom exclusions. To do that, see the follo
396391
- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
397392
- [Common mistakes to avoid when defining exclusions](common-exclusion-mistakes-microsoft-defender-antivirus.md)
398393
- [Customize, initiate, and review the results of Microsoft Defender Antivirus scans and remediation](customize-run-review-remediate-scans-microsoft-defender-antivirus.md)
399-
- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
400-
- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
401-
- [Configure Defender for Endpoint on Android features](android-configure.md)
402-
- [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
394+
- [Onboard client devices running Windows or macOS to Microsoft Defender for Endpoint](onboard-client.md)
395+
- [Onboard servers through Microsoft Defender for Endpoint's onboarding experience](onboard-server.md)
403396

404397
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
- mde-ngp
1818
search.appverid: met150
19-
ms.date: 04/01/2025
19+
ms.date: 05/01/2025
2020
---
2121

2222
# Detect and block potentially unwanted applications
@@ -193,7 +193,7 @@ get-mpPreference | ft PUAProtection
193193
| -------- | -------- |
194194
| `0` | PUA Protection off (Default). Microsoft Defender Antivirus won't protect against potentially unwanted applications. |
195195
| `1` | PUA Protection on. Detected items are blocked. They'll show in history along with other threats.|
196-
| `2` | Audit mode. Microsoft Defender Antivirus detects potentially unwanted applications but take no action. You can review information about the applications Windows Defender would've taken action against by searching for events created by Windows Defender in the Event Viewer.|
196+
| `2` | Audit mode. Microsoft Defender Antivirus detects potentially unwanted applications but takes no action. You can review information about the applications Microsoft Defender Antivirus would've taken action against by searching for events created by Microsoft Defender Antivirus in the Event Viewer, but not in the [Microsoft Defender portal](https://security.microsoft.com).|
197197

198198
For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/index).
199199

defender-endpoint/edr-detection.md

Lines changed: 25 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 03/04/2025
18+
ms.date: 04/30/2025
1919
---
2020

2121
# EDR detection test for verifying device's onboarding and reporting services
@@ -32,13 +32,11 @@ ms.date: 03/04/2025
3232
- Linux servers must be running a supported version (see [Prerequisites for Microsoft Defender for Endpoint on Linux](mde-linux-prerequisites.md))
3333
- Devices must be onboarded to Defender for Endpoint
3434

35-
Endpoint detection and response for Endpoint provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats.
36-
37-
Run an EDR detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
35+
Endpoint detection and response for Endpoint provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats. You can run an EDR detection test to verify that the device is properly onboarded and reporting to the service. This article describes how to run an EDR detection test on a newly onboarded device.
3836

3937
### Windows
4038

41-
1. Open a Command Prompt window
39+
1. Open a Command Prompt window.
4240

4341
2. At the prompt, copy and run the following command. The Command Prompt window closes automatically.
4442

@@ -50,35 +48,35 @@ Run an EDR detection test to verify that the device is properly onboarded and re
5048

5149
### Linux
5250

53-
1. Download [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server
54-
51+
1. Download [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server.
5552

56-
```bash
57-
curl -o ~/Downloads/MDE-Linux-EDR-DIY.zip -L https://aka.ms/MDE-Linux-EDR-DIY
58-
```
53+
```bash
54+
curl -o ~/Downloads/MDE-Linux-EDR-DIY.zip -L https://aka.ms/MDE-Linux-EDR-DIY
55+
```
5956

60-
2. Extract the zip
57+
2. Extract the zipped folder.
6158

62-
```bash
63-
unzip ~/Downloads/MDE-Linux-EDR-DIY.zip
64-
```
59+
```bash
60+
unzip ~/Downloads/MDE-Linux-EDR-DIY.zip
61+
```
6562

66-
3. And run the following command to give the script executable permission:
63+
3. Run the following command to give the script executable permission:
6764

68-
```bash
69-
chmod +x ./mde_linux_edr_diy.sh
70-
```
65+
```bash
66+
chmod +x ./mde_linux_edr_diy.sh
67+
```
7168

7269
4. Run the following command to execute the script:
73-
```bash
74-
./mde_linux_edr_diy.sh
75-
```
7670

77-
5. After a few minutes, a detection should be raised in Microsoft Defender XDR. Look at the alert details, machine timeline, and perform your typical investigation steps.
71+
```bash
72+
./mde_linux_edr_diy.sh
73+
```
74+
75+
After a few minutes, a detection should be raised in the [Microsoft Defender portal](https://security.microsoft.com). Look at the alert details, machine timeline, and perform your typical investigation steps.
7876

7977
### macOS
8078

81-
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.
79+
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract the zipped folder.
8280

8381
The following prompt appears:
8482

@@ -94,11 +92,11 @@ chmod +x ./mde_linux_edr_diy.sh
9492
> [!TIP]
9593
> If you double-click **MDATP MacOS DIY**, you will get the following message:
9694
>
97-
> > **"MDATP MacOS DIY" cannot be opened because the developer cannot be verifier.**<br/>
95+
> > **"MDATP MacOS DIY" cannot be opened because the developer cannot be verified.**<br/>
9896
> > macOS cannot verify that this app is free from malware.<br/>
99-
> > **[Move to Trash]** **[Cancel]**
97+
> > **[Move to Trash]** **[Done]**
10098
101-
7. Click **Cancel**.
99+
7. Click **Done**.
102100

103101
8. Right-click **MDATP MacOS DIY**, and then click **Open**.
104102

@@ -124,9 +122,7 @@ chmod +x ./mde_linux_edr_diy.sh
124122

125123
:::image type="content" source="media/b8db76c2-c368-49ad-970f-dcb87534d9be.png" alt-text="Screenshot that shows a macOS EDR test alert that shows severity, category, detection source, and a collapsed menu of actions":::
126124

127-
The macOS EDR test alert shows severity, category, detection source, and a collapsed menu of actions.
128-
129-
Look at the alert details and the device timeline, and perform the regular investigation steps.
125+
The macOS EDR test alert shows severity, category, detection source, and a collapsed menu of actions. Look at the alert details and the device timeline, and perform the regular investigation steps.
130126

131127

132128
## Next steps

defender-endpoint/enable-update-mdav-to-latest-ws.md

Lines changed: 20 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.reviewer: yongrhee
88
ms.localizationpriority: high
9-
ms.date: 03/14/2025
9+
ms.date: 05/01/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -27,14 +27,22 @@ search.appverid: met150
2727
- Microsoft Defender for Servers Plan 1 or Plan 2
2828
- Microsoft Defender Antivirus
2929

30-
If you wish to use Microsoft Defender Antivirus on your Windows Server, and it had been previously disabled or uninstalled, you may need to take further steps to re-enable it and ensure it's fully updated.
30+
This article describes how to enable and update Microsoft Defender Antivirus on Windows Server. You'd use the procedures in this article if Microsoft Defender Antivirus was previously disabled or uninstalled.
3131

32-
To enable and update Microsoft Defender Antivirus on Windows Server, perform the following steps:
32+
## Enable and update Microsoft Defender Antivirus on Windows Server
33+
34+
35+
1. Install the latest [servicing stack updates](/windows/deployment/update/servicing-stack-updates).
36+
37+
2. Install the latest [cumulative update](/windows/deployment/update/catalog-checkpoint-cumulative-updates).
38+
39+
3. Reinstall Microsoft Defender Antivirus or re-enable it. See the following sections (in this article):
40+
41+
- [Re-enable Microsoft Defender Antivirus on Windows Server if it was disabled](#re-enable-microsoft-defender-antivirus-on-windows-server-if-it-was-disabled)
42+
- [Re-enable Microsoft Defender Antivirus on Windows Server if it was uninstalled](#re-enable-microsoft-defender-antivirus-on-windows-server-if-it-was-uninstalled)
3343

34-
1. Install the latest Servicing Stack Update (SSU).
35-
2. Install the latest cumulative update (LCU).
36-
3. Reinstall Microsoft Defender Antivirus or re-enable it. For more information on how to reinstall or re-enable Microsoft Defender Antivirus on Windows Server, see [Re-enable Microsoft Defender Antivirus on Windows Server if it was disabled](#re-enable-microsoft-defender-antivirus-on-windows-server-if-it-was-disabled) and [Re-enable Microsoft Defender Antivirus on Windows Server if it was uninstalled](#re-enable-microsoft-defender-antivirus-on-windows-server-if-it-was-uninstalled).
3744
4. Reboot the system.
45+
3846
5. Install the latest version of the platform update.
3947

4048
> [!NOTE]
@@ -53,8 +61,11 @@ On Windows Server 2016, in some cases, you may need to use the [Malware Protecti
5361
As a local administrator on the server, perform the following steps:
5462

5563
1. Open Command Prompt.
56-
2. Run the following command:
57-
`%ProgramFiles%\Windows Defender\MpCmdRun.exe -wdenable`.
64+
65+
2. Run the following command:
66+
67+
`%ProgramFiles%\Windows Defender\MpCmdRun.exe -wdenable`
68+
5869
3. Restart the device.
5970

6071
## Re-enable Microsoft Defender Antivirus on Windows Server if it was uninstalled
@@ -92,4 +103,5 @@ As a local administrator on the server, perform the following steps:
92103
## Related articles
93104

94105
[Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)
106+
95107
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/uefi-scanning-in-defender-for-endpoint.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: UEFI scanning in Defender for Endpoint
2+
title: Firmware (UEFI) scanning in Defender for Endpoint
33
description: Learn how Microsoft Defender for Endpoint is extending its protection capabilities to the firmware level with a new Unified Extensible Firmware Interface (UEFI) scanner.
44
author: emmwalshh
55
ms.author: ewalsh
@@ -12,12 +12,12 @@ ms.subservice: ngp
1212
ms.localizationpriority: medium
1313
ms.custom:
1414
- admindeeplinkDEFENDER
15-
- partner-contribution
15+
- partner-contribution
1616
ms.collection:
1717
- m365-security
1818
- tier2
1919
search.appverid: met150
20-
ms.date: 03/26/2025
20+
ms.date: 05/01/2025
2121
---
2222

2323
# UEFI scanning in Defender for Endpoint

0 commit comments

Comments
 (0)