You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md
+59-64Lines changed: 59 additions & 64 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,9 +31,9 @@ search.appverid: met150
31
31
32
32
- Windows
33
33
34
-
This article is designed for customers who are using Microsoft Defender Antivirus capabilities only. If you have Microsoft Defender for Endpoint (which includes Microsoft Defender Antivirus alongside other device protection capabilities), also go through[Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR](configure-endpoints-vdi.md).
34
+
This article is designed for customers who are using Microsoft Defender Antivirus capabilities only. If you have Microsoft Defender for Endpoint (which includes Microsoft Defender Antivirus alongside other device protection capabilities), see[Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR](configure-endpoints-vdi.md).
35
35
36
-
You can use Microsoft Defender Antivirus in a remote desktop (RDS) or non-persistent virtual desktop infrastructure (VDI) environment. Following the guidance in this article, you can configure updates to download directly to your RDS or VDI environments when a user signs in.
36
+
You can use Microsoft Defender Antivirus in a remote desktop (RDS) or non-persistent virtual desktop infrastructure (VDI) environment. Using the guidance in this article, you can configure updates to download directly to your RDS or VDI environments whenever a user signs in.
37
37
38
38
This guide describes how to configure Microsoft Defender Antivirus on your VMs for optimal protection and performance, including how to:
39
39
@@ -60,11 +60,9 @@ In Windows 10, version 1903, Microsoft introduced the shared security intelligen
60
60
61
61
3. Select **Administrative templates**. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Security Intelligence Updates**.
62
62
63
-
4. Double-click **Define security intelligence location for VDI clients**, and then set the option to **Enabled**.
63
+
4. Double-click **Define security intelligence location for VDI clients**, and then set the option to **Enabled**. A field automatically appears.
64
64
65
-
A field automatically appears.
66
-
67
-
1. Enter `\\<File Server shared location\>\wdav-update` (for help with this value, see [Download and unpackage](#download-and-unpackage-the-latest-updates)).
65
+
5. In the field, type `\\<File Server shared location\>\wdav-update`. (For help with this value, see [Download and unpackage](#download-and-unpackage-the-latest-updates).)
68
66
69
67
6. Select **OK**, and then deploy the Group Policy Object to the VMs you want to test.
70
68
@@ -81,6 +79,7 @@ In Windows 10, version 1903, Microsoft introduced the shared security intelligen
81
79
Now you can get started on downloading and installing new updates. We've created a sample PowerShell script for you below. This script is the easiest way to download new updates and get them ready for your VMs. You should then set the script to run at a certain time on the management machine by using a scheduled task (or, if you're familiar with using PowerShell scripts in Azure, Intune, or SCCM, you could also use those scripts).
You can set a scheduled task to run once a day so that whenever the package is downloaded and unpacked then the VMs receive the new update. We suggest starting with once a day, but you should experiment with increasing or decreasing the frequency to understand the impact.
@@ -101,9 +101,9 @@ You can also set up your single server or machine to fetch the updates on behalf
101
101
102
102
1. Create an SMB/CIFS file share.
103
103
104
-
1. Use the following example to create a file share with the following share permissions.
104
+
2. Use the following example to create a file share with the following share permissions.
105
105
106
-
```PowerShell
106
+
```PowerShell
107
107
108
108
PS c:\> Get-SmbShareAccess -Name mdatp$
109
109
@@ -113,7 +113,7 @@ You can also set up your single server or machine to fetch the updates on behalf
113
113
114
114
```
115
115
116
-
> [!NOTE]
116
+
> [!NOTE]
117
117
> An NTFS permission is added for **Authenticated Users:Read:**.
118
118
119
119
For this example, the file share is `\\FileServer.fqdn\mdatp$\wdav-update`.
@@ -160,129 +160,124 @@ If you would prefer to do everything manually, here's what to do to replicate th
160
160
161
161
## Microsoft Defender Antivirus configuration settings
162
162
163
-
It’s important to take advantage of the included threat protection capabilities by enabling them with the following recommended configuration settings. It’s optimized for VDI environments.
163
+
It's important to take advantage of the included threat protection capabilities by enabling them with the following recommended configuration settings. It's optimized for VDI environments.
164
164
165
165
> [!TIP]
166
166
> The latest Windows group policy administrative templates are available in [Create and manage Central Store](/troubleshoot/windows-client/group-policy/create-and-manage-central-store).
167
167
168
168
### Root
169
169
170
-
Configure detection for potentially unwanted applications: Enabled - Block
170
+
-Configure detection for potentially unwanted applications: `Enabled - Block`
171
171
172
-
Configure local administrator merge behavior for lists: Disabled
172
+
-Configure local administrator merge behavior for lists: `Disabled`
173
173
174
-
Control whether or not exclusions are visible to Local Admins: Enabled
175
-
176
-
Turn off routine remediation: Disabled
177
-
178
-
Randomize scheduled scans: Enabled
174
+
- Control whether or not exclusions are visible to Local Admins: `Enabled`
179
175
176
+
- Turn off routine remediation: `Disabled`
180
177
178
+
- Randomize scheduled scans: `Enabled`
181
179
182
180
### Client Interface
183
181
184
-
Enable headless UI mode: Enabled
182
+
-Enable headless UI mode: `Enabled`
185
183
186
-
> [!NOTE]
187
-
> This policy hides the entire Microsoft Defender Antivirus user interface from end users in your organization.
184
+
> [!NOTE]
185
+
> This policy hides the entire Microsoft Defender Antivirus user interface from end users in your organization.
188
186
189
-
Suppress all notifications: Enabled
187
+
-Suppress all notifications: `Enabled`
190
188
191
189
> [!NOTE]
192
190
> Sometimes, Microsoft Defender Antivirus notifications are sent to or persist across multiple sessions. To help avoid user confusion, you can lock down the Microsoft Defender Antivirus user interface.
193
191
> Suppressing notifications prevents notifications from Microsoft Defender Antivirus from showing up when scans are done or remediation actions are taken. However, your security operations team sees the results of a scan if an attack is detected and stopped. Alerts, such as an initial access alert, are generated, and appear in the [Microsoft Defender portal](https://security.microsoft.com).
194
192
195
193
### MAPS
196
194
197
-
Join Microsoft MAPS (Turn on cloud-delivered protection): Enabled - Advanced MAPS
195
+
-Join Microsoft MAPS (Turn on cloud-delivered protection): `Enabled - Advanced MAPS`
198
196
199
-
Send file samples when further analysis is required: Send all samples (more secure) or Send safe sample (less secure)
197
+
-Send file samples when further analysis is required: `Send all samples (more secure)` or `Send safe sample (less secure)`
200
198
201
199
### MPEngine
202
200
203
-
Configure extended cloud check: 20
201
+
-Configure extended cloud check: `20`
204
202
205
-
Select cloud protection level: Enabled - High
203
+
-Select cloud protection level: `Enabled - High`
206
204
207
-
Enable file hash computation feature: Enabled
205
+
-Enable file hash computation feature: `Enabled`
208
206
209
207
> [!NOTE]
210
208
> "Enable file hash computation feature" is only needed if using Indicators – File hash. It can cause higher amount of CPU utilization, since it has to parse thru each binary on disk to get the file hash.
211
209
212
-
### Real-time Protection
210
+
### Real-time protection
213
211
214
-
Configure monitoring for incoming and outgoing file and program activity: Enabled – bi-directional (full on-access)
212
+
-Configure monitoring for incoming and outgoing file and program activity: `Enabled – bi-directional (full on-access)`
215
213
216
-
Monitor file and program activity on your computer: Enabled
214
+
-Monitor file and program activity on your computer: `Enabled`
217
215
218
-
Scan all downloaded files and attachments: Enabled
216
+
-Scan all downloaded files and attachments: `Enabled`
219
217
220
-
Turn on behavior monitoring: Enabled
218
+
-Turn on behavior monitoring: `Enabled`
221
219
222
-
Turn on process scanning whenever real-time protection is enabled: Enabled
220
+
-Turn on process scanning whenever real-time protection is enabled: `Enabled`
223
221
224
-
Turn on raw volume write notifications: Enabled
222
+
-Turn on raw volume write notifications: `Enabled`
225
223
226
224
### Scans
227
225
228
-
Check for the latest virus and spyware security intelligence before running a scheduled scan: Enabled
226
+
-Check for the latest virus and spyware security intelligence before running a scheduled scan: `Enabled`
229
227
230
-
Scan archive files: Enabled
228
+
-Scan archive files: `Enabled`
231
229
232
-
Scan network files: Not configured
230
+
-Scan network files: `Not configured`
233
231
234
-
Scan packed executables: Enabled
232
+
-Scan packed executables: `Enabled`
235
233
236
-
Scan removable drives: Enabled
234
+
-Scan removable drives: `Enabled`
237
235
238
-
Turn on catch-up full scan (Disable catch-up full scan): Not configured
236
+
-Turn on catch-up full scan (Disable catch-up full scan): `Not configured`
239
237
240
-
Turn on catch-up quick scan (Disable catchup quick scan): Not configured
> If you want to harden, you could change "Turn on catch-up quick scan" to enabled, which will help when VMs have been offline, and have missed two or more consecutive scheduled scans. But since it is running a scheduled scan, it will use additional CPU.
240
+
> [!NOTE]
241
+
> If you want to harden, you could change "Turn on catch-up quick scan" to enabled, which will help when VMs have been offline, and have missed two or more consecutive scheduled scans. But since it is running a scheduled scan, it will use additional CPU.
244
242
245
-
Turn on e-mail scanning: Enabled
243
+
-Turn on e-mail scanning: `Enabled`
246
244
247
-
Turn on heuristics: Enabled
245
+
-Turn on heuristics: `Enabled`
248
246
249
-
Turn on reparse point scanning: Enabled
247
+
-Turn on reparse point scanning: `Enabled`
250
248
251
-
#### __General scheduled scan settings__
249
+
#### General scheduled scan settings
252
250
253
-
Configure low CPU priority for scheduled scans (Use low CPU priority for scheduled scans): Not configured
251
+
-Configure low CPU priority for scheduled scans (Use low CPU priority for scheduled scans): `Not configured`
254
252
255
-
Specify the maximum percentage of CPU utilization during a scan (CPU usage limit per scan): 50
253
+
-Specify the maximum percentage of CPU utilization during a scan (CPU usage limit per scan): `50`
256
254
257
-
Start the scheduled scan only when computer is on but not in use (ScanOnlyIfIdle): Not configured
255
+
-Start the scheduled scan only when computer is on but not in use (ScanOnlyIfIdle): `Not configured`
258
256
259
-
Use the following cmdlet, to stop a quick or scheduled scan whenever the device goes idle if it is in passive mode.
257
+
- Use the following cmdlet, to stop a quick or scheduled scan whenever the device goes idle if it is in passive mode.
260
258
261
-
259
+
```powershell
262
260
261
+
Set-MpPreference -ScanOnlyIfIdleEnabled $false
263
262
264
-
```powershell
265
-
Set-MpPreference -ScanOnlyIfIdleEnabled $false
266
-
```
263
+
```
267
264
268
265
> [!TIP]
269
-
> "Start the scheduled scan only when computer is on but not in use" setting prevents significant CPU contention in high density environments.
270
-
271
-
#### __Daily quick scan__
272
-
273
-
Specify the interval to run quick scans per day: Not configured
266
+
> The setting, "Start the scheduled scan only when computer is on but not in use" prevents significant CPU contention in high-density environments.
274
267
275
-
Specify the time for a daily quick scan (Run daily quick scan at): 12 PM
268
+
#### Daily quick scan
276
269
270
+
- Specify the interval to run quick scans per day: `Not configured`
277
271
272
+
- Specify the time for a daily quick scan (Run daily quick scan at): `12 PM`
278
273
279
-
#### __Run a weekly scheduled scan (quick or full)__
274
+
#### Run a weekly scheduled scan (quick or full)
280
275
281
-
Specify the scan type to use for a scheduled scan (Scan type): Not configured
276
+
-Specify the scan type to use for a scheduled scan (Scan type): `Not configured`
282
277
283
-
Specify the time of day to run a scheduled scan (Day of week to run scheduled scan): Not configured
278
+
-Specify the time of day to run a scheduled scan (Day of week to run scheduled scan): `Not configured`
284
279
285
-
Specify the day of the week to run a scheduled scan (Time of day to run a scheduled scan): Not configured
280
+
-Specify the day of the week to run a scheduled scan (Time of day to run a scheduled scan): `Not configured`
0 commit comments