You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)
29
31
- Microsoft Defender Antivirus
30
32
31
33
**Platforms**
34
+
32
35
- Windows
33
36
37
+
Microsoft Defender Antivirus is available in the following editions/versions of Windows and Windows Server:
38
+
39
+
- Windows Server 2022
40
+
- Windows Server 2019
41
+
- Windows Server, version 1803 or later
42
+
- Windows Server 2016
43
+
- Windows Server 2012 R2 (Requires Microsoft Defender for Endpoint)
44
+
- Windows 11
45
+
- Windows 10
46
+
- Windows 8.1
47
+
48
+
For macOS, see [Detect and block potentially unwanted applications with Defender for Endpoint on macOS](/defender-endpoint/mac-pua).
49
+
50
+
For Linux, see [Detect and block potentially unwanted applications with Defender for Endpoint on Linux](/defender-endpoint/linux-pua).
51
+
34
52
Potentially unwanted applications (PUA) are a category of software that can cause your machine to run slowly, display unexpected ads, or at worst, install other software that might be unexpected or unwanted. PUA isn't considered a virus, malware, or other type of threat, but it might perform actions on endpoints that adversely affect endpoint performance or use. The term *PUA* can also refer to an application that has a poor reputation, as assessed by Microsoft Defender for Endpoint, due to certain kinds of undesirable behavior.
35
53
36
54
Here are some examples:
@@ -42,7 +60,7 @@ Here are some examples:
42
60
> [!TIP]
43
61
> For more examples and a discussion of the criteria we use to label applications for special attention from security features, see [How Microsoft identifies malware and potentially unwanted applications](/windows/security/threat-protection/intelligence/criteria).
44
62
45
-
Potentially unwanted applications can increase the risk of your network being infected with actual malware, make malware infections harder to identify, or cost your IT and security teams time and effort to clean them up. PUA protection is supported on Windows 11, Windows 10, Windows Server 2022, Windows Server 2019, and Windows Server 2016. If your organization's subscription includes [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), Microsoft Defender Antivirus blocks apps that are considered to be PUA by default on Windows devices.
63
+
Potentially unwanted applications can increase the risk of your network being infected with actual malware, make malware infections harder to identify, or cost your IT and security teams time and effort to clean them up. If your organization's subscription includes [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), you can also set Microsoft Defender Antivirus PUA to block, in order to block apps that are considered to be PUA on Windows devices.
46
64
47
65
[Learn more about Windows Enterprise subscriptions](https://www.microsoft.com/microsoft-365/windows/windows-11-enterprise).
48
66
@@ -77,19 +95,22 @@ Although Microsoft Defender for Endpoint has its own blocklist based upon a data
77
95
78
96
The potentially unwanted application (PUA) protection feature in Microsoft Defender Antivirus can detect and block PUA on endpoints in your network.
79
97
80
-
> [!NOTE]
81
-
> This feature is available in Windows 11, Windows 10, Windows Server 2022, Windows Server 2019, and Windows Server 2016.
82
-
83
98
Microsoft Defender Antivirus blocks detected PUA files and any attempts to download, move, run, or install them. Blocked PUA files are then moved to quarantine. When a PUA file is detected on an endpoint, Microsoft Defender Antivirus sends a notification to the user ([unless notifications have been disabled](configure-notifications-microsoft-defender-antivirus.md) in the same format as other threat detections. The notification is prefaced with `PUA:` to indicate its content.
84
99
85
100
The notification appears in the usual [quarantine list within the Windows Security app](microsoft-defender-security-center-antivirus.md).
86
101
87
102
## Configure PUA protection in Microsoft Defender Antivirus
88
103
89
-
You can enable PUA protection with [Microsoft Intune](/mem/intune/protect/device-protect), [Microsoft Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-protection), [Group Policy](/azure/active-directory-domain-services/manage-group-policy), or via [PowerShell cmdlets](/powershell/module/defender/?preserve-view=true&view=win10-ps).
104
+
You can enable PUA protection with Microsoft Defender for Endpoint Security Settings Management, [Microsoft Intune](/mem/intune/protect/device-protect), [Microsoft Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-protection), [Group Policy](/azure/active-directory-domain-services/manage-group-policy), or via [PowerShell cmdlets](/powershell/module/defender/?preserve-view=true&view=win10-ps).
90
105
91
106
At first, try using PUA protection in audit mode. It detects potentially unwanted applications without actually blocking them. Detections are captured in the Windows Event log. PUA protection in audit mode is useful if your company is conducting an internal software security compliance check and it's important to avoid false positives.
92
107
108
+
### Use Microsoft Defender for Endpoint Security Settings Management to configure PUA protection
109
+
110
+
See the following articles:
111
+
112
+
-[Use Microsoft Defender for Endpoint Security Settings Management to manage Microsoft Defender Antivirus](/defender-endpoint/mde-security-settings-management)
113
+
93
114
### Use Intune to configure PUA protection
94
115
95
116
See the following articles:
@@ -120,13 +141,11 @@ For System Center 2012 Configuration Manager, see [How to Deploy Potentially Unw
120
141
121
142
5. Expand the tree to **Windows Components**\>**Microsoft Defender Antivirus**.
122
143
123
-
6. Double-click **Configure detection for potentially unwanted applications**.
124
-
125
-
7. Select **Enabled** to enable PUA protection.
144
+
6. Double-click **Configure detection for potentially unwanted applications**, and set it to **Enabled**.
126
145
127
-
8. In **Options**, select **Block** to block potentially unwanted applications, or select **Audit Mode** to test how the setting works in your environment. Select **OK**.
146
+
7. In **Options**, select **Block** to block potentially unwanted applications, or select **Audit Mode** to test how the setting works in your environment. Select **OK**.
128
147
129
-
9. Deploy your Group Policy object as you usually do.
148
+
8. Deploy your Group Policy object as you usually do.
130
149
131
150
### Use PowerShell cmdlets to configure PUA protection
132
151
@@ -158,6 +177,10 @@ Setting the value for this cmdlet to `Disabled` turns off the feature if it has
158
177
159
178
For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/index).
160
179
180
+
## Test and make sure that PUA blocking works
181
+
182
+
Once you have PUA enabled in block mode, you can test to make sure that it's working properly. For more information, see [Potentially unwanted applications (PUA) demonstration](/defender-endpoint/defender-endpoint-demonstration-potentially-unwanted-applications).
183
+
161
184
## View PUA events using PowerShell
162
185
163
186
PUA events are reported in the Windows Event Viewer, but not in Microsoft Configuration Manager or in Intune. You can also use the `Get-MpThreat` cmdlet to view threats that Microsoft Defender Antivirus handled. Here's an example:
@@ -179,9 +202,7 @@ PSComputerName :
179
202
180
203
## Get email notifications about PUA detections
181
204
182
-
You can turn on email notifications to receive mail about PUA detections.
183
-
184
-
See [Troubleshoot event IDs](/defender-endpoint/troubleshoot-microsoft-defender-antivirus/) for details on viewing Microsoft Defender Antivirus events. PUA events are recorded under event ID **1160**.
205
+
You can turn on email notifications to receive mail about PUA detections. For more information about Microsoft Defender Antivirus events, see [Troubleshoot event IDs](/defender-endpoint/troubleshoot-microsoft-defender-antivirus/). PUA events are recorded under event ID **1160**.
185
206
186
207
## View PUA events using advanced hunting
187
208
@@ -205,10 +226,7 @@ For more information, see [Configure and validate exclusions based on file exten
205
226
206
227
> [!TIP]
207
228
> If you're looking for Antivirus related information for other platforms, see:
208
-
> -[Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
209
229
> -[Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
210
-
> -[macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
211
-
> -[Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
212
230
> -[Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
213
231
> -[Configure Defender for Endpoint on Android features](android-configure.md)
214
232
> -[Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
@@ -217,4 +235,5 @@ For more information, see [Configure and validate exclusions based on file exten
0 commit comments