You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-updates.md
+13-8Lines changed: 13 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- tier2
16
16
ms.topic: conceptual
17
17
search.appverid: met150
18
-
ms.date: 01/12/2024
18
+
ms.date: 02/10/2025
19
19
---
20
20
21
21
# Create a custom gradual rollout process for Microsoft Defender updates
@@ -49,19 +49,17 @@ The following table lists the available group policy settings for configuring up
49
49
## Group Policy
50
50
51
51
> [!NOTE]
52
-
> An updated Defender ADMX template are published together with the 21H2 release of Windows 10. A non-localized version is available for download at [defender-updatecontrols](https://github.com/microsoft/defender-updatecontrols) on GitHub.
52
+
> An updated Defender ADMX template is published together with the 21H2 release of Windows 10. A non-localized version is available for download at [defender-updatecontrols](https://github.com/microsoft/defender-updatecontrols) on GitHub.
53
53
54
-
You can use [Group Policy](/windows/win32/srvnodes/group-policy?redirectedfrom=MSDN) to configure and manage Microsoft Defender Antivirus on your endpoints.
55
-
56
-
In general, you can use the following procedure to configure or change Microsoft Defender Antivirus group policy settings:
54
+
You can use [Group Policy](/windows/win32/srvnodes/group-policy?redirectedfrom=MSDN) to configure and manage Microsoft Defender Antivirus on your endpoints. In general, you can use the following procedure to configure or change Microsoft Defender Antivirus group policy settings:
57
55
58
56
1. On your Group Policy management machine, open the **Group Policy Management Console**, right-click the **Group Policy Object** (GPO) you want to configure and select **Edit**.
59
57
60
58
2. Using the Group Policy Management Editor go to **Computer configuration**.
61
59
62
60
3. Select **Administrative templates**.
63
61
64
-
4. Expand the tree to **Windows components > Microsoft Defender Antivirus**.
62
+
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus**.
65
63
66
64
5. Expand the section (referred to as **Location** in the table in this article) that contains the setting you want to configure, double-click the setting to open it, and make configuration changes.
Use `Set-MpPreference -PlatformUpdatesChannel Beta` to configure platform updates to arrive from the Beta Channel.
95
92
96
93
For more information on the parameters and how to configure them, see [Set-MpPreference](/powershell/module/defender/set-mppreference) (Microsoft Defender Antivirus).
97
94
95
+
## Registry
96
+
97
+
These settings can be confirmed in the registry under `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender`:
98
+
99
+
-`EngineRing`
100
+
-`PlatformRing`
101
+
-`SignaturesRing`
102
+
98
103
> [!NOTE]
99
-
> You can also use a management tool such as Microsoft Configuration Manager to run PowerShell scripts. See [Create and run PowerShell scripts from the Configuration Manager console](/mem/configmgr/apps/deploy-use/create-deploy-scripts) for guidance on this topic.
104
+
> You can also use a management tool such as Microsoft Configuration Manager to run PowerShell scripts. See [Create and run PowerShell scripts from the Configuration Manager console](/mem/configmgr/apps/deploy-use/create-deploy-scripts).
100
105
101
106
> [!TIP]
102
107
> If you're looking for Antivirus related information for other platforms, see:
Copy file name to clipboardExpand all lines: defender-endpoint/ios-configure-features.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -317,9 +317,11 @@ Follow the steps below to create a compliance policy against jailbroken devices.
317
317
Defender for Endpoint on iOS enables admins to configure custom indicators on iOS devices as well. For more information on how to configure custom indicators, see [Overview of indicators](indicators-overview.md).
318
318
319
319
> [!NOTE]
320
-
> Defender for Endpoint on iOS supports creating custom indicators only for URLs and domains. IP based custom indicators aren't supported on iOS.
321
-
>
322
-
> For iOS, no alerts are generated on Microsoft Defender XDR when the URL or domain set in the indicator is accessed.
320
+
> Defender for Endpoint on iOS supports creating custom indicators only for URLs and domains. IP based custom indicators aren't supported on iOS.
321
+
>
322
+
> IP `245.245.0.1` is an internal Defender IP and should not be included in custom indicators by customers to avoid any functionality issues.
323
+
>
324
+
> For iOS, no alerts are generated in the Microsoft Defender portal when the URL or domain set in the indicator is accessed.
0 commit comments