You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For more information and to get your updates, see [Update for Microsoft Defender anti-malware platform](https://support.microsoft.com/help/4052623/update-for-microsoft-defender-antimalware-platform).
101
+
For more information and to get your updates, see [Update for Microsoft Defender anti-malware platform](/defender-endpoint/microsoft-defender-antivirus-updates).
102
102
103
103
### Cases where warn mode isn't supported
104
104
@@ -134,6 +134,8 @@ You can set attack surface reduction rules for devices that are running any of t
134
134
135
135
- Windows 10 Pro, [version 1709](/windows/whats-new/whats-new-windows-10-version-1709) or later
136
136
- Windows 10 Enterprise, [version 1709](/windows/whats-new/whats-new-windows-10-version-1709) or later
137
+
- Windows 11 Pro, version 21H2 or later
138
+
- Windows 11 Enterprise, version 21H2 or later
137
139
- Windows Server, [version 1803 (Semi-Annual Channel)](/windows-server/get-started/whats-new-in-windows-server-1803) or later
138
140
- Windows Server 2025
139
141
-[Windows Server 2022](/windows-server/get-started/whats-new-in-windows-server-2022)
Copy file name to clipboardExpand all lines: defender-endpoint/configure-cloud-block-timeout-period-microsoft-defender-antivirus.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Configure the Microsoft Defender Antivirus cloud block timeout period
3
-
description: You can configure how long Microsoft Defender Antivirus will block a file from running while waiting for a cloud determination.
2
+
title: Configure the Microsoft Defender Antivirus cloud block time-out period
3
+
description: You can configure how long Microsoft Defender Antivirus blocks a file from running while waiting for a cloud determination.
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
6
author: emmwalshh
@@ -18,7 +18,7 @@ ms.collection:
18
18
search.appverid: met150
19
19
---
20
20
21
-
# Configure the cloud block timeout period
21
+
# Configure the cloud block time out period
22
22
23
23
**Applies to:**
24
24
-[Microsoft Defender XDR](/defender-xdr)
@@ -33,15 +33,15 @@ search.appverid: met150
33
33
34
34
When Microsoft Defender Antivirus finds a suspicious file, it can prevent the file from running while it queries the [Microsoft Defender Antivirus cloud service](cloud-protection-microsoft-defender-antivirus.md).
35
35
36
-
The default period that the file is [blocked](configure-block-at-first-sight-microsoft-defender-antivirus.md) is 10 seconds. If you're a security administrator, you can specify more time to wait before the file is allowed to run. Extending the cloud block timeout period can help ensure there is enough time to receive a proper determination from the Microsoft Defender Antivirus cloud service.
36
+
The default period that the file is [blocked](configure-block-at-first-sight-microsoft-defender-antivirus.md) is 10 seconds. If you're a security administrator, you can specify more time to wait before the file is allowed to run. Extending the cloud block time out period can help ensure there's enough time to receive a proper determination from the Microsoft Defender Antivirus cloud service.
37
37
38
-
## Prerequisites to use the extended cloud block timeout
38
+
## Prerequisites to use the extended cloud block time out
39
39
40
-
[Block at first sight](configure-block-at-first-sight-microsoft-defender-antivirus.md) and its prerequisites must be enabled before you can specify an extended timeout period.
40
+
[Block at first sight](configure-block-at-first-sight-microsoft-defender-antivirus.md) and its prerequisites must be enabled before you can specify an extended time out period.
41
41
42
-
## Specify the extended timeout period using Microsoft Defender for Endpoint Security settings management
42
+
## Specify the extended time out period using Microsoft Defender for Endpoint Security settings management
43
43
44
-
To specify the cloud block timeout period with Microsoft Defender for Endpoint Security settings management:
44
+
To specify the cloud block time out period with Microsoft Defender for Endpoint Security settings management:
45
45
46
46
1. Go to the Microsoft Defender for Endpoint portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
@@ -50,29 +50,29 @@ To specify the cloud block timeout period with Microsoft Defender for Endpoint S
50
50
5. Under **Select Template** choose: "Microsoft Defender Antivirus".
51
51
6. Select **Create policy**.
52
52
7. Enter a name and description and select **Next**.
53
-
8. From the **Defender** dropdown go to **Cloud Extended Timeout** and toggle it on.
53
+
8. From the Defender dropdown, go to **Cloud Extended Timeout** and toggle it on.
54
54
9. Specify the extended time, in seconds, from 1 second to 50 seconds. Whatever you specify is added to the default 10 seconds.
55
55
10. Select **Next** and **Save** to finish configuring your policy.
56
56
57
-
## Specify the extended timeout period using Microsoft Intune
57
+
## Specify the extended time out period using Microsoft Intune
58
58
59
-
You can specify the cloud block timeout period with an [endpoint security policy in Microsoft Intune](/mem/intune/protect/endpoint-security-policy).
59
+
You can specify the cloud block time out period with an [endpoint security policy in Microsoft Intune](/mem/intune/protect/endpoint-security-policy).
60
60
61
61
1. Go to the Intune admin center ([https://intune.microsoft.com/](https://intune.microsoft.com/)) and sign in.
62
62
63
63
2. Select **Endpoint security**, and then under **Manage**, choose **Antivirus**.
64
64
65
65
3. Select (or create) an antivirus policy.
66
66
67
-
4. In the **Configuration settings** section, scroll down to **Cloud Extended Timeout** and specify the timeout, in seconds, from 0 to 50 seconds. Whatever you specify is added to the default 10 seconds.
67
+
4. In the **Configuration settings** section, scroll down to **Cloud Extended Timeout** and specify the time out, in seconds, from 0 to 50 seconds. Whatever you specify is added to the default 10 seconds.
68
68
69
69
5. (This step is optional) Make any other changes to your antivirus policy. (Need help? See [Settings for Microsoft Defender Antivirus policy in Microsoft Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-windows).)
70
70
71
71
6. Choose **Next**, and finish configuring your policy.
72
72
73
-
## Specify the extended timeout period using Group Policy
73
+
## Specify the extended time out period using Group Policy
74
74
75
-
You can use Group Policy to specify an extended timeout for cloud checks.
75
+
You can use Group Policy to specify an extended time out for cloud checks.
76
76
77
77
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11))
Copy file name to clipboardExpand all lines: defender-endpoint/configure-proxy-internet.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,8 @@ title: Configure your devices to connect to the Defender for Endpoint service us
3
3
description: Learn how to configure your devices to enable communication with the cloud service using a proxy.
4
4
search.appverid: met150
5
5
ms.service: defender-endpoint
6
-
ms.author: deniseb
7
-
author: denisebmsft
6
+
ms.author: ewalsh
7
+
author: emmwalshh
8
8
ms.localizationpriority: medium
9
9
manager: deniseb
10
10
audience: ITPro
@@ -39,7 +39,7 @@ Depending on the operating system, the proxy to be used for Microsoft Defender f
39
39
40
40
- For Windows devices, see [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md) (in this article).
41
41
- For Linux devices, see [Configure Microsoft Defender for Endpoint on Linux for static proxy discovery](linux-static-proxy-configuration.md).
42
-
- For macOS devices, see [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md#network-connections).
42
+
- For macOS devices, see [Microsoft Defender for Endpoint on macOS](microsoft-defender-endpoint-mac-prerequisites.md#network-connectivity).
43
43
44
44
The Defender for Endpoint sensor requires Microsoft Windows HTTP (`WinHTTP`) to report sensor data and communicate with the Defender for Endpoint service. The embedded Defender for Endpoint sensor runs in system context using the `LocalSystem` account.
Copy file name to clipboardExpand all lines: defender-endpoint/enable-attack-surface-reduction.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- mde-asr
16
16
ms.custom: admindeeplinkDEFENDER
17
17
search.appverid: met150
18
-
ms.date: 04/30/2025
18
+
ms.date: 05/08/2025
19
19
---
20
20
21
21
# Enable attack surface reduction rules
@@ -102,7 +102,7 @@ When adding exclusions, keep these points in mind:
102
102
103
103
If a conflicting policy is applied via MDM and GP, the setting applied from Group Policy takes precedence.
104
104
105
-
Attack surface reduction rules for managed devices now support behavior for merging settings from different policies to create a policy superset for each device. Only the settings that aren't in conflict are merged, whereas policy conficts aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile were deployed.
105
+
Attack surface reduction rules for managed devices now support behavior for merging settings from different policies to create a policy superset for each device. Only the settings that aren't in conflict are merged, whereas policy conflicts aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile were deployed.
106
106
107
107
Attack surface reduction rule merge behavior works as follows:
108
108
@@ -139,6 +139,7 @@ The following procedures for enabling attack surface reduction rules include ins
139
139
> If you're using Intune on Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2), you need to set the following attack surface reduction rules to `Not Configured` because they're not supported on these OS versions. Otherwise, these policies fail to apply:
140
140
> -[Block persistence through Windows Management Instrumentation (WMI) event subscription](/defender-endpoint/attack-surface-reduction-rules-reference#block-persistence-through-wmi-event-subscription)
141
141
> -[Block JavaScript or VBScript from launching downloaded executable content](/defender-endpoint/attack-surface-reduction-rules-reference#block-javascript-or-vbscript-from-launching-downloaded-executable-content)
142
+
> -[Block Win32 API calls from Office macro](/defender-endpoint/attack-surface-reduction-rules-reference#block-win32-api-calls-from-office-macros)
-[Turn on cloud protection in Microsoft Defender Antivirus](#turn-on-cloud-protection-in-microsoft-defender-antivirus)
63
+
-[Why cloud protection should be turned on](#why-cloud-protection-should-be-turned-on)
64
+
-[Methods to configure cloud protection](#methods-to-configure-cloud-protection)
65
+
-[Use Microsoft Intune to turn on cloud protection](#use-microsoft-intune-to-turn-on-cloud-protection)
66
+
-[Use Group Policy to turn on cloud protection](#use-group-policy-to-turn-on-cloud-protection)
67
+
-[Use PowerShell cmdlets to turn on cloud protection](#use-powershell-cmdlets-to-turn-on-cloud-protection)
68
+
-[Use Windows Management Instruction (WMI) to turn on cloud protection](#use-windows-management-instruction-wmi-to-turn-on-cloud-protection)
69
+
-[Turn on cloud protection on individual clients with the Windows Security app](#turn-on-cloud-protection-on-individual-clients-with-the-windows-security-app)
70
+
-[See also](#see-also)
66
71
67
72
You can also use [Configuration Manager](/mem/configmgr/protect/deploy-use/defender-advanced-threat-protection). And, you can turn cloud protection on or off on individual endpoints by using the [Windows Security app](#turn-on-cloud-protection-on-individual-clients-with-the-windows-security-app).
0 commit comments