Skip to content

Commit 22acc86

Browse files
authored
Merge pull request #462 from YongRhee-MSFT/docs-editor/detect-block-potentially-unwan-1715883933
Update detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md
2 parents 57c13dc + 9ab1e80 commit 22acc86

File tree

1 file changed

+38
-19
lines changed

1 file changed

+38
-19
lines changed

defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md

Lines changed: 38 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -16,21 +16,39 @@ ms.collection:
1616
- tier2
1717
- mde-ngp
1818
search.appverid: met150
19-
ms.date: 05/02/2024
19+
ms.date: 05/17/2024
2020
---
2121

2222
# Detect and block potentially unwanted applications
2323

2424
**Applies to:**
2525

26-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
27-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
26+
- [Microsoft Defender XDR](/defender-xdr)
27+
- [Microsoft Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md)
28+
- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
2829
- [Microsoft Edge](/microsoft-edge/deploy/microsoft-edge)
30+
- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)
2931
- Microsoft Defender Antivirus
3032

3133
**Platforms**
34+
3235
- Windows
3336

37+
Microsoft Defender Antivirus is available in the following editions/versions of Windows and Windows Server:
38+
39+
- Windows Server 2022
40+
- Windows Server 2019
41+
- Windows Server, version 1803 or later
42+
- Windows Server 2016
43+
- Windows Server 2012 R2 (Requires Microsoft Defender for Endpoint)
44+
- Windows 11
45+
- Windows 10
46+
- Windows 8.1
47+
48+
For macOS, see [Detect and block potentially unwanted applications with Defender for Endpoint on macOS](/defender-endpoint/mac-pua).
49+
50+
For Linux, see [Detect and block potentially unwanted applications with Defender for Endpoint on Linux](/defender-endpoint/linux-pua).
51+
3452
Potentially unwanted applications (PUA) are a category of software that can cause your machine to run slowly, display unexpected ads, or at worst, install other software that might be unexpected or unwanted. PUA isn't considered a virus, malware, or other type of threat, but it might perform actions on endpoints that adversely affect endpoint performance or use. The term *PUA* can also refer to an application that has a poor reputation, as assessed by Microsoft Defender for Endpoint, due to certain kinds of undesirable behavior.
3553

3654
Here are some examples:
@@ -42,7 +60,7 @@ Here are some examples:
4260
> [!TIP]
4361
> For more examples and a discussion of the criteria we use to label applications for special attention from security features, see [How Microsoft identifies malware and potentially unwanted applications](/windows/security/threat-protection/intelligence/criteria).
4462
45-
Potentially unwanted applications can increase the risk of your network being infected with actual malware, make malware infections harder to identify, or cost your IT and security teams time and effort to clean them up. PUA protection is supported on Windows 11, Windows 10, Windows Server 2022, Windows Server 2019, and Windows Server 2016. If your organization's subscription includes [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), Microsoft Defender Antivirus blocks apps that are considered to be PUA by default on Windows devices.
63+
Potentially unwanted applications can increase the risk of your network being infected with actual malware, make malware infections harder to identify, or cost your IT and security teams time and effort to clean them up. If your organization's subscription includes [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), you can also set Microsoft Defender Antivirus PUA to block, in order to block apps that are considered to be PUA on Windows devices.
4664

4765
[Learn more about Windows Enterprise subscriptions](https://www.microsoft.com/microsoft-365/windows/windows-11-enterprise).
4866

@@ -77,19 +95,22 @@ Although Microsoft Defender for Endpoint has its own blocklist based upon a data
7795

7896
The potentially unwanted application (PUA) protection feature in Microsoft Defender Antivirus can detect and block PUA on endpoints in your network.
7997

80-
> [!NOTE]
81-
> This feature is available in Windows 11, Windows 10, Windows Server 2022, Windows Server 2019, and Windows Server 2016.
82-
8398
Microsoft Defender Antivirus blocks detected PUA files and any attempts to download, move, run, or install them. Blocked PUA files are then moved to quarantine. When a PUA file is detected on an endpoint, Microsoft Defender Antivirus sends a notification to the user ([unless notifications have been disabled](configure-notifications-microsoft-defender-antivirus.md) in the same format as other threat detections. The notification is prefaced with `PUA:` to indicate its content.
8499

85100
The notification appears in the usual [quarantine list within the Windows Security app](microsoft-defender-security-center-antivirus.md).
86101

87102
## Configure PUA protection in Microsoft Defender Antivirus
88103

89-
You can enable PUA protection with [Microsoft Intune](/mem/intune/protect/device-protect), [Microsoft Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-protection), [Group Policy](/azure/active-directory-domain-services/manage-group-policy), or via [PowerShell cmdlets](/powershell/module/defender/?preserve-view=true&view=win10-ps).
104+
You can enable PUA protection with Microsoft Defender for Endpoint Security Settings Management, [Microsoft Intune](/mem/intune/protect/device-protect), [Microsoft Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-protection), [Group Policy](/azure/active-directory-domain-services/manage-group-policy), or via [PowerShell cmdlets](/powershell/module/defender/?preserve-view=true&view=win10-ps).
90105

91106
At first, try using PUA protection in audit mode. It detects potentially unwanted applications without actually blocking them. Detections are captured in the Windows Event log. PUA protection in audit mode is useful if your company is conducting an internal software security compliance check and it's important to avoid false positives.
92107

108+
### Use Microsoft Defender for Endpoint Security Settings Management to configure PUA protection
109+
110+
See the following articles:
111+
112+
- [Use Microsoft Defender for Endpoint Security Settings Management to manage Microsoft Defender Antivirus](/defender-endpoint/mde-security-settings-management)
113+
93114
### Use Intune to configure PUA protection
94115

95116
See the following articles:
@@ -120,13 +141,11 @@ For System Center 2012 Configuration Manager, see [How to Deploy Potentially Unw
120141

121142
5. Expand the tree to **Windows Components** \> **Microsoft Defender Antivirus**.
122143

123-
6. Double-click **Configure detection for potentially unwanted applications**.
124-
125-
7. Select **Enabled** to enable PUA protection.
144+
6. Double-click **Configure detection for potentially unwanted applications**, and set it to **Enabled**.
126145

127-
8. In **Options**, select **Block** to block potentially unwanted applications, or select **Audit Mode** to test how the setting works in your environment. Select **OK**.
146+
7. In **Options**, select **Block** to block potentially unwanted applications, or select **Audit Mode** to test how the setting works in your environment. Select **OK**.
128147

129-
9. Deploy your Group Policy object as you usually do.
148+
8. Deploy your Group Policy object as you usually do.
130149

131150
### Use PowerShell cmdlets to configure PUA protection
132151

@@ -158,6 +177,10 @@ Setting the value for this cmdlet to `Disabled` turns off the feature if it has
158177

159178
For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/index).
160179

180+
## Test and make sure that PUA blocking works
181+
182+
Once you have PUA enabled in block mode, you can test to make sure that it's working properly. For more information, see [Potentially unwanted applications (PUA) demonstration](/defender-endpoint/defender-endpoint-demonstration-potentially-unwanted-applications).
183+
161184
## View PUA events using PowerShell
162185

163186
PUA events are reported in the Windows Event Viewer, but not in Microsoft Configuration Manager or in Intune. You can also use the `Get-MpThreat` cmdlet to view threats that Microsoft Defender Antivirus handled. Here's an example:
@@ -179,9 +202,7 @@ PSComputerName :
179202

180203
## Get email notifications about PUA detections
181204

182-
You can turn on email notifications to receive mail about PUA detections.
183-
184-
See [Troubleshoot event IDs](/defender-endpoint/troubleshoot-microsoft-defender-antivirus/) for details on viewing Microsoft Defender Antivirus events. PUA events are recorded under event ID **1160**.
205+
You can turn on email notifications to receive mail about PUA detections. For more information about Microsoft Defender Antivirus events, see [Troubleshoot event IDs](/defender-endpoint/troubleshoot-microsoft-defender-antivirus/). PUA events are recorded under event ID **1160**.
185206

186207
## View PUA events using advanced hunting
187208

@@ -205,10 +226,7 @@ For more information, see [Configure and validate exclusions based on file exten
205226

206227
> [!TIP]
207228
> If you're looking for Antivirus related information for other platforms, see:
208-
> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
209229
> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
210-
> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
211-
> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
212230
> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
213231
> - [Configure Defender for Endpoint on Android features](android-configure.md)
214232
> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
@@ -217,4 +235,5 @@ For more information, see [Configure and validate exclusions based on file exten
217235

218236
- [Next-generation protection](microsoft-defender-antivirus-windows.md)
219237
- [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md)
238+
220239
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)