Skip to content

Commit 21f8a4f

Browse files
committed
Update configure-notifications-microsoft-defender-antivirus.md
1 parent 58202c2 commit 21f8a4f

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

defender-endpoint/configure-notifications-microsoft-defender-antivirus.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: emmwalshh
88
ms.topic: conceptual
99
ms.author: ewalsh
1010
ms.custom: nextgen
11-
ms.date: 10/18/2021
11+
ms.date: 02/19/2025
1212
ms.reviewer: yongrhee
1313
manager: deniseb
1414
ms.collection:
@@ -31,7 +31,7 @@ search.appverid: met150
3131

3232
In Windows 10 and Windows 11, application notifications about malware detection and remediation are more robust, consistent, and concise. Microsoft Defender Antivirus notifications appear on endpoints when scans are completed and threats are detected. Notifications follow both scheduled and manually triggered scans. These notifications also appear in the **Notification Center**, and a summary of scans and threat detections appear at regular time intervals.
3333

34-
If you're part of your organization's security team, you can configure how notifications appear on endpoints, such as notifications that prompt for a system reboot or that indicate a threat has been detected and remediated.
34+
If you're part of your organization's security team, you can configure how notifications appear on endpoints, such as notifications that prompt for a system reboot or that indicate a threat was detected and remediated.
3535

3636
## Configure antivirus notifications using Group Policy or the Windows Security app
3737

@@ -41,7 +41,7 @@ You can configure the display of more notifications, such as recent threat detec
4141
| Setting| Description |
4242
| -------- | -------- |
4343
| Configure time interval for service health reports | This policy setting configures the time interval (in minutes) for the service health reports to be sent from endpoints. If you disable or do not configure this setting, the default value will be applied. The default value is set at 60 minutes (1 hour). If you configure this setting to 0, no service health reports will be sent. The maximum value allowed to be set is 14400 minutes (10 days). |
44-
| Configure time out for detections in critically failed state | This policy setting configures the time in minutes before a detection in the critically failed state to moves to either the additional action state or the cleared state. |
44+
| Configure time out for detections in critically failed state | This policy setting configures the time in minutes before a detection in the "critically failed" state to moves to either the "additional action" state or the "cleared" state. |
4545
| Configure time out for detections in non-critical failed state | This policy setting configures the time in minutes before a detection in the "non-critically failed" state moves to the "cleared" state. |
4646
| Configure time out for detections in recently remediated state | This policy setting configures the time in minutes before a detection in the "completed" state moves to the "cleared" state. |
4747
| Configure time out for detections in requiring additional action | This policy setting configures the time in minutes before a detection in the "additional action" state moves to the "cleared" state. |

0 commit comments

Comments
 (0)