Skip to content

Commit 2c7edd1

Browse files
committed
Learn Editor: Update configure-notifications-microsoft-defender-antivirus.md
1 parent 9184752 commit 2c7edd1

File tree

1 file changed

+15
-0
lines changed

1 file changed

+15
-0
lines changed

defender-endpoint/configure-notifications-microsoft-defender-antivirus.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,21 @@ If you're part of your organization's security team, you can configure how notif
3737

3838
You can configure the display of more notifications, such as recent threat detection summaries, in the [Windows Security app](microsoft-defender-security-center-antivirus.md) and with Group Policy.
3939

40+
41+
| Setting| Description |
42+
| -------- | -------- |
43+
| Configure time interval for service health reports | This policy setting configures the time interval (in minutes) for the service health reports to be sent from endpoints. If you disable or do not configure this setting, the default value will be applied. The default value is set at 60 minutes (1 hour). If you configure this setting to 0, no service health reports will be sent. The maximum value allowed to be set is 14400 minutes (10 days). |
44+
| Configure time out for detections in critically failed state | This policy setting configures the time in minutes before a detection in the “critically failed” state to moves to either the “additional action” state or the “cleared” state. |
45+
| Configure time out for detections in non-critical failed state | This policy setting configures the time in minutes before a detection in the "non-critically failed" state moves to the "cleared" state. |
46+
| Configure time out for detections in recently remediated state | This policy setting configures the time in minutes before a detection in the "completed" state moves to the "cleared" state. |
47+
| Configure time out for detections in requiring additional action | This policy setting configures the time in minutes before a detection in the "additional action" state moves to the "cleared" state. |
48+
| Configure Watson events | This policy setting allows you to configure whether or not Watson events are sent. If you enable or do not configure this setting, Watson events will be sent. If you disable this setting, Watson events will not be sent. |
49+
| Configure whether to report Dynamic Signature dropped events | This policy setting configures whether to report Dynamic Signature dropped events. If you do not configure this setting, the default value will be applied. The default value is set to disabled (such events are not reported). If you configure this setting to enabled, Dynamic Signature dropped events will be reported. If you configure this setting to disabled, Dynamic Signature dropped events will not be reported. |
50+
| Configure Windows software trace preprocessor components | This policy configures Windows software trace preprocessor (WPP Software Tracing) components. |
51+
| Configure WPP tracing level | This policy allows you to configure tracing levels for Windows software trace preprocessor (WPP Software Tracing). Tracing levels are defined as: 1 - Error 2 - Warning 3 - Info 4 - Debug |
52+
| Turn off enhanced notifications | Use this policy setting to specify if you want Microsoft Defender Antivirus enhanced notifications to display on clients. If you disable or do not configure this setting, Microsoft Defender Antivirus enhanced notifications will display on clients. If you enable this setting, Microsoft Defender Antivirus enhanced notifications will not display on clients. |
53+
54+
4055
> [!NOTE]
4156
> In Windows 10, version 1607 the feature was called **Enhanced notifications** and was configured under **Windows Settings** \> **Update & security** \> **Windows Defender**. In Group Policy settings for all versions of Windows 10 and Windows 11, the notification feature is called **Enhanced notifications**.
4257

0 commit comments

Comments
 (0)