You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/manage-protection-updates-microsoft-defender-antivirus.md
+17-16Lines changed: 17 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,7 +71,6 @@ To ensure the best level of protection, Microsoft Update allows for rapid releas
71
71
72
72
Platform updates and engine updates are released on a monthly cadence. Security intelligence updates are delivered multiple times a day, but this delta package doesn't contain an engine update. See [Microsoft Defender Antivirus security intelligence and product updates](microsoft-defender-antivirus-updates.md).
73
73
74
-
75
74
> [!IMPORTANT]
76
75
> If you have set [Microsoft Security intelligence page](https://www.microsoft.com/security/portal/definitions/adl.aspx) updates as a fallback source after Windows Server Update Service or Microsoft Update, updates are only downloaded from security intelligence updates and platform updates when the current update is considered out-of-date. (By default, this is seven consecutive days of not being able to apply updates from the Windows Server Update Service or Microsoft Update services).
77
76
> You can, however, [set the number of days before protection is reported as out-of-date](manage-outdated-endpoints-microsoft-defender-antivirus.md).<p>
@@ -100,23 +99,25 @@ The procedures in this article first describe how to set the order, and then how
100
99
101
100
1. In the **Group Policy Management Editor**, go to **Computer configuration**.
102
101
103
-
1. Select **Policies** then **Administrative templates**.
102
+
2. Select **Policies** then **Administrative templates**.
104
103
105
-
1. Expand the tree to **Windows components** > **Windows Defender** > **Signature updates** and then configure the following settings:
104
+
3. Expand the tree to **Windows components** > **Windows Defender** > **Signature updates**.
106
105
107
-
1. Edit the **Define the order of sources for downloading security intelligence updates** setting. Set the option to **Enabled**.
106
+
4. Edit the **Define the order of sources for downloading security intelligence updates** setting. Set the option to **Enabled**.
108
107
109
-
2. Specify the order of sources, separated by a single pipe, for example: `InternalDefinitionUpdateServer|MicrosoftUpdateServer|MMPC`, as shown in the following screenshot.
108
+
5. Specify the order of sources, separated by a single pipe, for example: `InternalDefinitionUpdateServer|MicrosoftUpdateServer|MMPC`, as shown in the following screenshot.
110
109
111
-
:::image type="content" source="/defender/media/wdav-order-update-sources.png" alt-text="Group policy setting listing the order of sources" lightbox="/defender/media/wdav-order-update-sources.png":::
110
+
:::image type="content" source="/defender/media/wdav-order-update-sources.png" alt-text="Group policy setting listing the order of sources" lightbox="/defender/media/wdav-order-update-sources.png":::
112
111
113
-
1. Select **OK**. This action sets the order of protection update sources.
114
-
115
-
1. Edit the **Define file shares for downloading security intelligence updates** setting and then set the option to **Enabled**.
116
-
117
-
1. On a Windows Server, specify the file share source. If you have multiple sources, specify each source in the order they should be used, separated by a single pipe. Use [standard UNC notation](/openspecs/windows_protocols/ms-dtyp/62e862f4-2a51-452e-8eeb-dc4ff5ee33cc) for denoting the path, for example: `\\host-name1\share-name\object-name|\\host-name2\share-name\object-name`. If you don't enter any paths, then this source is skipped when the VM downloads updates.
112
+
6. Select **OK**. This action sets the order of protection update sources.
113
+
114
+
7. Edit the **Define file shares for downloading security intelligence updates** setting and then set the option to **Enabled**.
115
+
116
+
8. On a Windows Server, specify the file share source. If you have multiple sources, specify each source in the order they should be used, separated by a single pipe. Use [standard UNC notation](/openspecs/windows_protocols/ms-dtyp/62e862f4-2a51-452e-8eeb-dc4ff5ee33cc) for denoting the path. For example: `\\host-name1\share-name\object-name|\\host-name2\share-name\object-name`.
117
+
118
+
If you don't enter any paths, then this source is skipped when the VM downloads updates.
118
119
119
-
6. Select **OK**. This action sets the order of file shares when that source is referenced in the **Define the order of sources...** group policy setting.
120
+
9. Select **OK**. This action sets the order of file shares when that source is referenced in the **Define the order of sources...** group policy setting.
120
121
121
122
> [!NOTE]
122
123
> For Windows 10, versions 1703 up to and including 1809, the policy path is **Windows Components > Microsoft Defender Antivirus > Signature Updates**
@@ -253,14 +254,16 @@ On a Windows Server set up a network file share (UNC/mapped drive) to download s
253
254
254
255
If the scheduled task fails, run the following commands:
0 commit comments