You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/defender-endpoint-false-positives-negatives.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -212,9 +212,11 @@ To define exclusions across Microsoft Defender for Endpoint, perform the followi
212
212
213
213
- [Create "allow" indicators for Microsoft Defender for Endpoint](#indicators-for-defender-for-endpoint)
214
214
- [Define exclusions for Microsoft Defender Antivirus](#exclusions-for-microsoft-defender-antivirus)
215
+
- For Attack Surface Reduction Rule exclusions [Configure attack surface reduction per-rule exclusions](/defender-endpoint/attack-surface-reduction-rules-deployment-test#configure-attack-surface-reduction-per-rule-exclusions) or you can leverage [ASR rule only exclusions](/defender-endpoint/enable-attack-surface-reduction#exclude-files-and-folders-from-attack-surface-reduction-rules)
215
216
216
217
> [!NOTE]
217
218
> Microsoft Defender Antivirus exclusions apply only to antivirus protection, not across other Microsoft Defender for Endpoint capabilities. To exclude files broadly, use [custom indicators](indicators-overview.md) for Microsoft Defender for Endpoint and exclusions for Microsoft Defender Antivirus.
219
+
> ASR Rules can leverage ASR Rule Exclusions - where the exclusions apply to all ASR Rules; ASR per Rule Exclusions; Defender AV exclusions; as well as allow indicators defined in Custom Indicators.
218
220
219
221
The procedures in this section describe how to define indicators and exclusions.
Copy file name to clipboardExpand all lines: defender-endpoint/evaluate-mdav-using-gp.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -180,13 +180,13 @@ Disable local administrator AV settings such as exclusions, and enforce the poli
180
180
| --- | --- |
181
181
| Prevent users and apps from accessing dangerous websites | Enabled, Block |
182
182
| This settings controls whether Network Protection is allowed to be configured into block or audit mode on Windows Server | Enabled |
183
-
| Allow Network Protection Down Level | Network protection is enabled downlevel |
184
-
| Allow Datagram Processing On Win Server | Datagram processing on Windows Server is enabled |
185
-
| Disable DNS over TCP parsing | DNS over TCP parsing is enabled |
186
-
|Disable HTTP parsing | HTTP parsing is enabled|
187
-
|Disable SSH parsing | SSH parsing is enabled|
188
-
|Disable TLS parsing | TLS parsing is enabled|
189
-
|Enable DNS Sinkhole | DNS Sinkhole is enabled |
183
+
184
+
To enable Network Protection for Windows Servers, for now, please use Powershell:
185
+
186
+
|OS | Powershell cmdlet|
187
+
|--- | ---|
188
+
|Windows Server 2012 R2Windows Server 2022 and later | set-MpPreference -AllowNetworkProtectionOnWinServer $true|
189
+
| Windows Server 2016 and Windows Server 2012 R2 [unified MDE client](/defender-endpoint/update-agent-mma-windows#upgrade-to-the-new-unified-agent-for-defender-for-endpoint) | set-MpPreference -AllowNetworkProtectionOnWinServer $true and set-MpPreference -AllowNetworkProtectionDownLevel $true
190
190
191
191
## Attack Surface Reduction Rules
192
192
@@ -207,7 +207,7 @@ Disable local administrator AV settings such as exclusions, and enforce the poli
207
207
| c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb<br><br>**Note:** ( \[PREVIEW\] Block use of copied or impersonated system tools) | 1 (Block) |
208
208
| d3e037e1-3eb8-44c8-a917-57927947596d<br><br>**Note:** (Block JavaScript or VBScript from launching downloaded executable content) | 1 (Block) |
209
209
| 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2<br><br>**Note:** (Block credential stealing from the Windows local security authority subsystem) | 1 (Block) |
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-antivirus-compatibility.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -207,12 +207,13 @@ You can use one of several methods to confirm the state of Microsoft Defender An
207
207
-[Use Windows PowerShell to confirm that antivirus protection is running](#use-windows-powershell-to-confirm-that-antivirus-protection-is-running).
208
208
209
209
> [!IMPORTANT]
210
-
> Beginning with [platform version 4.18.2208.0 and later](microsoft-defender-antivirus-updates.md#platform-and-engine-releases): If a server has been onboarded to Microsoft Defender for Endpoint, the "Turn off Windows Defender" [group policy](configure-endpoints-gp.md#update-endpoint-protection-configuration) setting no longer completely disables Windows Defender Antivirus on Windows Server 2012 R2 and later. Instead, it place Microsoft Defender Antivirus into passive mode. In addition, the [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) allows a switch to active mode, but not to passive mode.
210
+
> Beginning with [platform version 4.18.2208.0 and later](microsoft-defender-antivirus-updates.md#platform-and-engine-releases): If a server has been onboarded to Microsoft Defender for Endpoint, the "Turn off Windows Defender" [group policy](configure-endpoints-gp.md#update-endpoint-protection-configuration) setting no longer completely disables Windows Defender Antivirus on Windows Server 2012 R2 and later. Instead, it places Microsoft Defender Antivirus into passive mode. In addition, the [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) allows a switch to active mode, but not to passive mode.
211
211
>
212
212
> - If "Turn off Windows Defender" is already in place before onboarding to Microsoft Defender for Endpoint, Microsoft Defender Antivirus remains disabled.
213
213
> - To switch Microsoft Defender Antivirus to passive mode, even if it was disabled before onboarding, you can apply the [ForceDefenderPassiveMode configuration](switch-to-mde-phase-2.md#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) with a value of `1`. To place it into active mode, switch this value to `0` instead.
214
214
>
215
215
> Note the modified logic for `ForceDefenderPassiveMode` when tamper protection is enabled: Once Microsoft Defender Antivirus is toggled to active mode, tamper protection prevents it from going back into passive mode even when `ForceDefenderPassiveMode` is set to `1`.
216
+
>Microsoft Defender for Endpoint – EDR response actions always operate in Passive mode, even if EDR is in block mode.
216
217
217
218
### Use the Windows Security app to identify your antivirus app
0 commit comments