Skip to content

Commit 21f8d76

Browse files
authored
Update manage-tamper-protection-intune.md
Updated this page with some content related to TP exclusions for SCCM. R=There was a leftover from when we support TP exclusions for Intune only.
1 parent 20157f7 commit 21f8d76

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

defender-endpoint/manage-tamper-protection-intune.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,10 @@ If your organization has [exclusions defined for Microsoft Defender Antivirus](c
9090
| Microsoft Defender platform | Devices are running Microsoft Defender platform `4.18.2211.5` or later. For more information, see [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#monthly-platform-and-engine-versions). |
9191
| `DisableLocalAdminMerge` setting | This setting is also known as preventing local list merging. `DisableLocalAdminMerge` is enabled so that settings configured on a device aren't merged with organization policies, such as settings in Intune. For more information, see [DisableLocalAdminMerge](/windows/client-management/mdm/defender-csp). |
9292
| Device management | Devices are either managed in Intune only, or are managed with Configuration Manager only. Sense must be enabled. |
93-
| Antivirus exclusions | Microsoft Defender Antivirus exclusions are managed in Microsoft Intune. For more information, see [Settings for Microsoft Defender Antivirus policy in Microsoft Intune for Windows devices](/mem/intune/protect/antivirus-microsoft-defender-settings-windows). <br/><br/>Functionality to protect Microsoft Defender Antivirus exclusions is enabled on devices. For more information, see [How to determine whether antivirus exclusions are tamper protected on a Windows device](#how-to-determine-whether-antivirus-exclusions-are-tamper-protected-on-a-windows-device). |
93+
| Antivirus exclusions | Microsoft Defender Antivirus exclusions are managed in Microsoft Intune or Configuration Manager. For more information, see [Settings for Microsoft Defender Antivirus policy in Microsoft Intune for Windows devices](/mem/intune/protect/antivirus-microsoft-defender-settings-windows). <br/><br/>Functionality to protect Microsoft Defender Antivirus exclusions is enabled on devices. For more information, see [How to determine whether antivirus exclusions are tamper protected on a Windows device](#how-to-determine-whether-antivirus-exclusions-are-tamper-protected-on-a-windows-device). |
94+
95+
> [!NOTE]
96+
> For example, when Configuration Manager is used solely to manage exclusions and the required conditions are met, exclusions from Configuration Manager will be tamper-protected. Therefore, there is no need to push AV exclusions using Microsoft Intune.
9497
9598
> [!TIP]
9699
> For more detailed information about Microsoft Defender Antivirus exclusions, see [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).

0 commit comments

Comments
 (0)