Skip to content

Commit 318a59e

Browse files
committed
Update deployment-vdi-microsoft-defender-antivirus.md
1 parent d973d7d commit 318a59e

File tree

1 file changed

+59
-64
lines changed

1 file changed

+59
-64
lines changed

defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md

Lines changed: 59 additions & 64 deletions
Original file line numberDiff line numberDiff line change
@@ -31,9 +31,9 @@ search.appverid: met150
3131

3232
- Windows
3333

34-
This article is designed for customers who are using Microsoft Defender Antivirus capabilities only. If you have Microsoft Defender for Endpoint (which includes Microsoft Defender Antivirus alongside other device protection capabilities), also go through [Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR](configure-endpoints-vdi.md).
34+
This article is designed for customers who are using Microsoft Defender Antivirus capabilities only. If you have Microsoft Defender for Endpoint (which includes Microsoft Defender Antivirus alongside other device protection capabilities), see [Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR](configure-endpoints-vdi.md).
3535

36-
You can use Microsoft Defender Antivirus in a remote desktop (RDS) or non-persistent virtual desktop infrastructure (VDI) environment. Following the guidance in this article, you can configure updates to download directly to your RDS or VDI environments when a user signs in.
36+
You can use Microsoft Defender Antivirus in a remote desktop (RDS) or non-persistent virtual desktop infrastructure (VDI) environment. Using the guidance in this article, you can configure updates to download directly to your RDS or VDI environments whenever a user signs in.
3737

3838
This guide describes how to configure Microsoft Defender Antivirus on your VMs for optimal protection and performance, including how to:
3939

@@ -60,11 +60,9 @@ In Windows 10, version 1903, Microsoft introduced the shared security intelligen
6060

6161
3. Select **Administrative templates**. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Security Intelligence Updates**.
6262

63-
4. Double-click **Define security intelligence location for VDI clients**, and then set the option to **Enabled**.
63+
4. Double-click **Define security intelligence location for VDI clients**, and then set the option to **Enabled**. A field automatically appears.
6464

65-
A field automatically appears.
66-
67-
1. Enter `\\<File Server shared location\>\wdav-update` (for help with this value, see [Download and unpackage](#download-and-unpackage-the-latest-updates)).
65+
5. In the field, type `\\<File Server shared location\>\wdav-update`. (For help with this value, see [Download and unpackage](#download-and-unpackage-the-latest-updates).)
6866

6967
6. Select **OK**, and then deploy the Group Policy Object to the VMs you want to test.
7068

@@ -81,6 +79,7 @@ In Windows 10, version 1903, Microsoft introduced the shared security intelligen
8179
Now you can get started on downloading and installing new updates. We've created a sample PowerShell script for you below. This script is the easiest way to download new updates and get them ready for your VMs. You should then set the script to run at a certain time on the management machine by using a scheduled task (or, if you're familiar with using PowerShell scripts in Azure, Intune, or SCCM, you could also use those scripts).
8280

8381
```PowerShell
82+
8483
$vdmpathbase = "$env:systemdrive\wdav-update\{00000000-0000-0000-0000-"
8584
$vdmpathtime = Get-Date -format "yMMddHHmmss"
8685
$vdmpath = $vdmpathbase + $vdmpathtime + '}'
@@ -91,6 +90,7 @@ New-Item -ItemType Directory -Force -Path $vdmpath | Out-Null
9190
Invoke-WebRequest -Uri 'https://go.microsoft.com/fwlink/?LinkID=121721&arch=x64' -OutFile $vdmpackage
9291
9392
Start-Process -FilePath $vdmpackage -WorkingDirectory $vdmpath -ArgumentList "/x"
93+
9494
```
9595

9696
You can set a scheduled task to run once a day so that whenever the package is downloaded and unpacked then the VMs receive the new update. We suggest starting with once a day, but you should experiment with increasing or decreasing the frequency to understand the impact.
@@ -101,9 +101,9 @@ You can also set up your single server or machine to fetch the updates on behalf
101101

102102
1. Create an SMB/CIFS file share.
103103

104-
1. Use the following example to create a file share with the following share permissions.
104+
2. Use the following example to create a file share with the following share permissions.
105105

106-
```PowerShell
106+
```PowerShell
107107
108108
PS c:\> Get-SmbShareAccess -Name mdatp$
109109
@@ -113,7 +113,7 @@ You can also set up your single server or machine to fetch the updates on behalf
113113
114114
```
115115

116-
> [!NOTE]
116+
> [!NOTE]
117117
> An NTFS permission is added for **Authenticated Users:Read:**.
118118
119119
For this example, the file share is `\\FileServer.fqdn\mdatp$\wdav-update`.
@@ -160,129 +160,124 @@ If you would prefer to do everything manually, here's what to do to replicate th
160160
161161
## Microsoft Defender Antivirus configuration settings
162162

163-
Its important to take advantage of the included threat protection capabilities by enabling them with the following recommended configuration settings.  Its optimized for VDI environments.
163+
It's important to take advantage of the included threat protection capabilities by enabling them with the following recommended configuration settings.  It's optimized for VDI environments.
164164

165165
> [!TIP]
166166
> The latest Windows group policy administrative templates are available in [Create and manage Central Store](/troubleshoot/windows-client/group-policy/create-and-manage-central-store).
167167
168168
### Root
169169

170-
Configure detection for potentially unwanted applications: Enabled - Block
170+
- Configure detection for potentially unwanted applications: `Enabled - Block`
171171

172-
Configure local administrator merge behavior for lists: Disabled
172+
- Configure local administrator merge behavior for lists: `Disabled`
173173

174-
Control whether or not exclusions are visible to Local Admins: Enabled
175-
176-
Turn off routine remediation: Disabled
177-
178-
Randomize scheduled scans: Enabled
174+
- Control whether or not exclusions are visible to Local Admins: `Enabled`
179175

176+
- Turn off routine remediation: `Disabled`
180177

178+
- Randomize scheduled scans: `Enabled`
181179

182180
### Client Interface
183181

184-
Enable headless UI mode: Enabled
182+
- Enable headless UI mode: `Enabled`
185183

186-
> [!NOTE]
187-
> This policy hides the entire Microsoft Defender Antivirus user interface from end users in your organization.
184+
> [!NOTE]
185+
> This policy hides the entire Microsoft Defender Antivirus user interface from end users in your organization.
188186
189-
Suppress all notifications: Enabled
187+
- Suppress all notifications: `Enabled`
190188

191189
> [!NOTE]
192190
> Sometimes, Microsoft Defender Antivirus notifications are sent to or persist across multiple sessions. To help avoid user confusion, you can lock down the Microsoft Defender Antivirus user interface.
193191
> Suppressing notifications prevents notifications from Microsoft Defender Antivirus from showing up when scans are done or remediation actions are taken. However, your security operations team sees the results of a scan if an attack is detected and stopped. Alerts, such as an initial access alert, are generated, and appear in the [Microsoft Defender portal](https://security.microsoft.com).
194192
195193
### MAPS
196194

197-
Join Microsoft MAPS (Turn on cloud-delivered protection): Enabled - Advanced MAPS
195+
- Join Microsoft MAPS (Turn on cloud-delivered protection): `Enabled - Advanced MAPS`
198196

199-
Send file samples when further analysis is required: Send all samples (more secure) or Send safe sample (less secure)
197+
- Send file samples when further analysis is required: `Send all samples (more secure)` or `Send safe sample (less secure)`
200198

201199
### MPEngine
202200

203-
Configure extended cloud check: 20
201+
- Configure extended cloud check: `20`
204202

205-
Select cloud protection level: Enabled - High
203+
- Select cloud protection level: `Enabled - High`
206204

207-
Enable file hash computation feature: Enabled
205+
- Enable file hash computation feature: `Enabled`
208206

209207
> [!NOTE]
210208
> "Enable file hash computation feature" is only needed if using Indicators – File hash.  It can cause higher amount of CPU utilization, since it has to parse thru each binary on disk to get the file hash.
211209
212-
### Real-time Protection
210+
### Real-time protection
213211

214-
Configure monitoring for incoming and outgoing file and program activity: Enabled – bi-directional (full on-access)
212+
- Configure monitoring for incoming and outgoing file and program activity: `Enabled – bi-directional (full on-access)`
215213

216-
Monitor file and program activity on your computer: Enabled
214+
- Monitor file and program activity on your computer: `Enabled`
217215

218-
Scan all downloaded files and attachments: Enabled
216+
- Scan all downloaded files and attachments: `Enabled`
219217

220-
Turn on behavior monitoring: Enabled
218+
- Turn on behavior monitoring: `Enabled`
221219

222-
Turn on process scanning whenever real-time protection is enabled: Enabled
220+
- Turn on process scanning whenever real-time protection is enabled: `Enabled`
223221

224-
Turn on raw volume write notifications: Enabled
222+
- Turn on raw volume write notifications: `Enabled`
225223

226224
### Scans
227225

228-
Check for the latest virus and spyware security intelligence before running a scheduled scan: Enabled
226+
- Check for the latest virus and spyware security intelligence before running a scheduled scan: `Enabled`
229227

230-
Scan archive files: Enabled
228+
- Scan archive files: `Enabled`
231229

232-
Scan network files: Not configured
230+
- Scan network files: `Not configured`
233231

234-
Scan packed executables: Enabled
232+
- Scan packed executables: `Enabled`
235233

236-
Scan removable drives: Enabled
234+
- Scan removable drives: `Enabled`
237235

238-
Turn on catch-up full scan (Disable catch-up full scan): Not configured
236+
- Turn on catch-up full scan (Disable catch-up full scan): `Not configured`
239237

240-
Turn on catch-up quick scan (Disable catchup quick scan): Not configured
238+
- Turn on catch-up quick scan (Disable catchup quick scan): `Not configured`
241239

242-
> [!NOTE]
243-
> If you want to harden, you could change "Turn on catch-up quick scan" to enabled, which will help when VMs have been offline, and have missed two or more consecutive scheduled scans.  But since it is running a scheduled scan, it will use additional CPU.
240+
> [!NOTE]
241+
> If you want to harden, you could change "Turn on catch-up quick scan" to enabled, which will help when VMs have been offline, and have missed two or more consecutive scheduled scans.  But since it is running a scheduled scan, it will use additional CPU.
244242
245-
Turn on e-mail scanning: Enabled
243+
- Turn on e-mail scanning: `Enabled`
246244

247-
Turn on heuristics: Enabled
245+
- Turn on heuristics: `Enabled`
248246

249-
Turn on reparse point scanning: Enabled
247+
- Turn on reparse point scanning: `Enabled`
250248

251-
#### __General scheduled scan settings__
249+
#### General scheduled scan settings
252250

253-
Configure low CPU priority for scheduled scans (Use low CPU priority for scheduled scans): Not configured
251+
- Configure low CPU priority for scheduled scans (Use low CPU priority for scheduled scans): `Not configured`
254252

255-
Specify the maximum percentage of CPU utilization during a scan (CPU usage limit per scan): 50
253+
- Specify the maximum percentage of CPU utilization during a scan (CPU usage limit per scan): `50`
256254

257-
Start the scheduled scan only when computer is on but not in use (ScanOnlyIfIdle): Not configured
255+
- Start the scheduled scan only when computer is on but not in use (ScanOnlyIfIdle): `Not configured`
258256

259-
Use the following cmdlet, to stop a quick or scheduled scan whenever the device goes idle if it is in passive mode.
257+
- Use the following cmdlet, to stop a quick or scheduled scan whenever the device goes idle if it is in passive mode.
260258

261-
259+
```powershell
262260
261+
Set-MpPreference -ScanOnlyIfIdleEnabled $false
263262
264-
```powershell
265-
Set-MpPreference -ScanOnlyIfIdleEnabled $false
266-
```
263+
```
267264

268265
> [!TIP]
269-
> "Start the scheduled scan only when computer is on but not in use" setting prevents significant CPU contention in high density environments.
270-
271-
#### __Daily quick scan__
272-
273-
Specify the interval to run quick scans per day: Not configured
266+
> The setting, "Start the scheduled scan only when computer is on but not in use" prevents significant CPU contention in high-density environments.
274267
275-
Specify the time for a daily quick scan (Run daily quick scan at): 12 PM
268+
#### Daily quick scan
276269

270+
- Specify the interval to run quick scans per day: `Not configured`
277271

272+
- Specify the time for a daily quick scan (Run daily quick scan at): `12 PM`
278273

279-
#### __Run a weekly scheduled scan (quick or full)__
274+
#### Run a weekly scheduled scan (quick or full)
280275

281-
Specify the scan type to use for a scheduled scan (Scan type): Not configured
276+
- Specify the scan type to use for a scheduled scan (Scan type): `Not configured`
282277

283-
Specify the time of day to run a scheduled scan (Day of week to run scheduled scan): Not configured
278+
- Specify the time of day to run a scheduled scan (Day of week to run scheduled scan): `Not configured`
284279

285-
Specify the day of the week to run a scheduled scan (Time of day to run a scheduled scan): Not configured
280+
- Specify the day of the week to run a scheduled scan (Time of day to run a scheduled scan): `Not configured`
286281

287282
### Security Intelligence Updates
288283

0 commit comments

Comments
 (0)