Skip to content

Commit 3c22f80

Browse files
committed
Update manage-protection-updates-microsoft-defender-antivirus.md
1 parent ca68bf9 commit 3c22f80

File tree

1 file changed

+17
-16
lines changed

1 file changed

+17
-16
lines changed

defender-endpoint/manage-protection-updates-microsoft-defender-antivirus.md

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,6 @@ To ensure the best level of protection, Microsoft Update allows for rapid releas
7171

7272
Platform updates and engine updates are released on a monthly cadence. Security intelligence updates are delivered multiple times a day, but this delta package doesn't contain an engine update. See [Microsoft Defender Antivirus security intelligence and product updates](microsoft-defender-antivirus-updates.md).
7373

74-
7574
> [!IMPORTANT]
7675
> If you have set [Microsoft Security intelligence page](https://www.microsoft.com/security/portal/definitions/adl.aspx) updates as a fallback source after Windows Server Update Service or Microsoft Update, updates are only downloaded from security intelligence updates and platform updates when the current update is considered out-of-date. (By default, this is seven consecutive days of not being able to apply updates from the Windows Server Update Service or Microsoft Update services).
7776
> You can, however, [set the number of days before protection is reported as out-of-date](manage-outdated-endpoints-microsoft-defender-antivirus.md).<p>
@@ -100,23 +99,25 @@ The procedures in this article first describe how to set the order, and then how
10099

101100
1. In the **Group Policy Management Editor**, go to **Computer configuration**.
102101

103-
1. Select **Policies** then **Administrative templates**.
102+
2. Select **Policies** then **Administrative templates**.
104103

105-
1. Expand the tree to **Windows components** > **Windows Defender** > **Signature updates** and then configure the following settings:
104+
3. Expand the tree to **Windows components** > **Windows Defender** > **Signature updates**.
106105

107-
1. Edit the **Define the order of sources for downloading security intelligence updates** setting. Set the option to **Enabled**.
106+
4. Edit the **Define the order of sources for downloading security intelligence updates** setting. Set the option to **Enabled**.
108107

109-
2. Specify the order of sources, separated by a single pipe, for example: `InternalDefinitionUpdateServer|MicrosoftUpdateServer|MMPC`, as shown in the following screenshot.
108+
5. Specify the order of sources, separated by a single pipe, for example: `InternalDefinitionUpdateServer|MicrosoftUpdateServer|MMPC`, as shown in the following screenshot.
110109

111-
:::image type="content" source="/defender/media/wdav-order-update-sources.png" alt-text="Group policy setting listing the order of sources" lightbox="/defender/media/wdav-order-update-sources.png":::
110+
:::image type="content" source="/defender/media/wdav-order-update-sources.png" alt-text="Group policy setting listing the order of sources" lightbox="/defender/media/wdav-order-update-sources.png":::
112111

113-
1. Select **OK**. This action sets the order of protection update sources.
114-
115-
1. Edit the **Define file shares for downloading security intelligence updates** setting and then set the option to **Enabled**.
116-
117-
1. On a Windows Server, specify the file share source. If you have multiple sources, specify each source in the order they should be used, separated by a single pipe. Use [standard UNC notation](/openspecs/windows_protocols/ms-dtyp/62e862f4-2a51-452e-8eeb-dc4ff5ee33cc) for denoting the path, for example: `\\host-name1\share-name\object-name|\\host-name2\share-name\object-name`. If you don't enter any paths, then this source is skipped when the VM downloads updates.
112+
6. Select **OK**. This action sets the order of protection update sources.
113+
114+
7. Edit the **Define file shares for downloading security intelligence updates** setting and then set the option to **Enabled**.
115+
116+
8. On a Windows Server, specify the file share source. If you have multiple sources, specify each source in the order they should be used, separated by a single pipe. Use [standard UNC notation](/openspecs/windows_protocols/ms-dtyp/62e862f4-2a51-452e-8eeb-dc4ff5ee33cc) for denoting the path. For example: `\\host-name1\share-name\object-name|\\host-name2\share-name\object-name`.
117+
118+
If you don't enter any paths, then this source is skipped when the VM downloads updates.
118119

119-
6. Select **OK**. This action sets the order of file shares when that source is referenced in the **Define the order of sources...** group policy setting.
120+
9. Select **OK**. This action sets the order of file shares when that source is referenced in the **Define the order of sources...** group policy setting.
120121

121122
> [!NOTE]
122123
> For Windows 10, versions 1703 up to and including 1809, the policy path is **Windows Components > Microsoft Defender Antivirus > Signature Updates**
@@ -253,14 +254,16 @@ On a Windows Server set up a network file share (UNC/mapped drive) to download s
253254

254255
If the scheduled task fails, run the following commands:
255256

256-
```console
257+
```console
258+
257259
C:\windows\system32\windowspowershell\v1.0\powershell.exe -NoProfile -executionpolicy allsigned -command "&\"C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1\" -action run -arch x64 -isDelta $False -destDir C:\Temp\TempSigs\x64"
258260

259261
C:\windows\system32\windowspowershell\v1.0\powershell.exe -NoProfile -executionpolicy allsigned -command "&\"C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1\" -action run -arch x64 -isDelta $True -destDir C:\Temp\TempSigs\x64"
260262

261263
C:\windows\system32\windowspowershell\v1.0\powershell.exe -NoProfile -executionpolicy allsigned -command "&\"C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1\" -action run -arch x86 -isDelta $False -destDir C:\Temp\TempSigs\x86"
262264

263265
C:\windows\system32\windowspowershell\v1.0\powershell.exe -NoProfile -executionpolicy allsigned -command "&\"C:\Tool\PS-Scripts\SignatureDownloadCustomTask.ps1\" -action run -arch x86 -isDelta $True -destDir C:\Temp\TempSigs\x86"
266+
264267
```
265268

266269
10. Create a share pointing to `C:\Temp\TempSigs` (for example, `\\server\updates`).
@@ -271,9 +274,7 @@ On a Windows Server set up a network file share (UNC/mapped drive) to download s
271274
11. Set the share location in the policy to the share.
272275

273276
> [!NOTE]
274-
> Do not add the x64 (or x86) folder in the path. The mpcmdrun.exe process adds it automatically.
275-
276-
277+
> Do not add the x64 (or x86) folder in the path. The `mpcmdrun.exe` process adds it automatically.
277278

278279
## Related articles
279280

0 commit comments

Comments
 (0)