Skip to content

Commit 3b7fed6

Browse files
authored
Merge pull request #4304 from KesemSharabi/passive-mode
Passive mode
2 parents 749406e + 1e4300d commit 3b7fed6

File tree

2 files changed

+116
-0
lines changed

2 files changed

+116
-0
lines changed

defender-endpoint/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -803,6 +803,8 @@
803803
href: microsoft-defender-endpoint-antivirus-performance-mode.md
804804
- name: Compatibility with other security products
805805
href: microsoft-defender-antivirus-compatibility.md
806+
- name: Defender for Endpoint passive mode
807+
href: microsoft-defender-passive-mode.md
806808
- name: Microsoft Defender Antivirus and third-party antivirus solutions without
807809
Defender for Endpoint
808810
href: defender-antivirus-compatibility-without-mde.md
Lines changed: 114 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,114 @@
1+
---
2+
title: Defender for Endpoint with Defender Antivirus in passive mode
3+
ms.topic: conceptual
4+
description: Understand how Defender Antivirus in passive mode works and when to use it.
5+
ms.service: defender-endpoint
6+
author: KesemSharabi
7+
ms.author: kesharab
8+
ms.localizationpriority: high
9+
audience: ITPro
10+
ms.collection:
11+
- m365-security
12+
- tier1
13+
- mde-ngp
14+
ms.subservice: ngp
15+
search.appverid: met150
16+
ms.date: 03/26/2025
17+
---
18+
19+
# Defender Antivirus in passive mode
20+
21+
[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)]
22+
23+
Microsoft Defender for Endpoint is a comprehensive security solution designed to protect your devices from evolving threats. One of its key features enables Microsoft Defender Antivirus to coexist with non-Microsoft antimalware solutions while still providing valuable endpoint detection and response capabilities.
24+
25+
Some of the key benefits of Defender Antivirus in passive mode are:
26+
27+
* **EDR Block mode** - Post-breach protection by detecting and remediating threats missed by the active antimalware solution
28+
29+
* **Data Loss Prevention (DLP)** - Endpoint DLP functionalities operate normally, ensuring sensitive data is safeguarded.
30+
31+
* **Security intelligence updates** - Microsoft Defender Antivirus continues to receive updates to stay aware of the latest threats.
32+
33+
* **Data Loss Prevention (DLP)** - Endpoint DLP functionalities operate normally, ensuring sensitive data is safeguarded.
34+
35+
For more information, see [How Microsoft Defender Antivirus affects Defender for Endpoint functionality](microsoft-defender-antivirus-compatibility.md#how-microsoft-defender-antivirus-affects-defender-for-endpoint-functionality).
36+
37+
>[!NOTE]
38+
>Passive mode disables Microsoft Defender Antivirus scheduled scans unless specific configurations are applied.
39+
40+
## Prerequisites
41+
42+
* Operating system
43+
* Windows 10 or newer
44+
* Windows Server 2012 R2 or newer
45+
46+
* The device must be onboarded to Microsoft Defender for Endpoint
47+
48+
* Microsoft Defender Antivirus has to be installed and enabled
49+
50+
## Configure passive mode
51+
52+
On Windows 10 or newer, Defender Antivirus automatically enters passive mode when a non-Microsoft antimalware solution is installed and registered.
53+
54+
For Windows Server operating systems, follow the instructions in this section to configure passive mode for Microsoft Defender for Endpoint.
55+
56+
### Set the registry key
57+
58+
To avoid conflicts between Microsoft Defender Antivirus and a third-party antivirus solution, if you're using Windows Server, set the following registry key before onboarding the device to Microsoft Defender for Endpoint:
59+
60+
* **Path** - HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection
61+
62+
* **Name** - ForceDefenderPassiveMode
63+
64+
* **Type** - REG_DWORD
65+
66+
* **Value** - 1
67+
68+
### Enable EDR in block mode
69+
70+
When Microsoft Defender Antivirus is in passive mode, EDR in block mode can provide post-breach protection by detecting and remediating threats. Ensure this feature is enabled in Defender for Endpoint.
71+
72+
### Avoid service modifications
73+
74+
Don't disable, stop, or modify associated services such as `wscsvc`, `WinDefend`, or `MsMpEng`. Stopping these services can cause instability and make your device vulnerable to threats.
75+
76+
### Exclude Defender binaries in third-party antivirus
77+
78+
To prevent performance issues or conflicts, add Microsoft Defender Antivirus and Defender for Endpoint binaries to the exclusion list of your third-party antivirus solution.
79+
80+
## Verify that passive mode is enabled
81+
82+
This section describes how to confirm whether Microsoft Defender Antivirus is in passive mode.
83+
84+
### Windows PowerShell
85+
86+
Run the following PowerShell cmdlet:
87+
88+
```powershell
89+
Get-MpComputerStatus | select AMRunningMode
90+
```
91+
92+
The `AMRunningMode` value indicates the current Defender Antivirus state:
93+
94+
* **Normal** - Active mode
95+
96+
* **Passive** - Passive mode
97+
98+
* **EDR Block Mode** - EDR is operating in block mode
99+
100+
### Windows security app
101+
102+
Follow these steps to verify that Microsoft Defender Antivirus is in passive mode (Windows 10 and later only).
103+
104+
1. Open the Windows Security app.
105+
106+
2. Select **Virus & threat protection**.
107+
108+
3. Under **Who’s protecting me?**, select **Manage providers**.
109+
110+
4. On the *Security providers* page, verify the antivirus provider and state.
111+
112+
## Additional resources
113+
114+
[Microsoft Defender Antivirus compatibility with other security products](microsoft-defender-antivirus-compatibility.md)

0 commit comments

Comments
 (0)