Skip to content

Commit 4bc92e0

Browse files
authored
Merge pull request #2446 from MicrosoftDocs/main
main to live publish, 1/14/2025, 10:45 AM
2 parents 6d12d01 + 5b4b8b1 commit 4bc92e0

10 files changed

+33
-30
lines changed

defender-endpoint/command-line-arguments-microsoft-defender-antivirus.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,12 @@ In our example, the MpCmdRun utility starts a full antivirus scan on the device.
7171
|`-ResetPlatform`| Reset platform binaries back to `%ProgramFiles%\Windows Defender`.|
7272
|`-RevertPlatform`| Revert platform binaries back to the previously installed version of the Defender platform.|
7373

74+
> [!NOTE]
75+
> For the "Scan" command, the following are the default timeout values for Quick or Full scans where the scan will stop at that time by default.
76+
> - Portal initiated scans (Quick or Full) or Windows Security app (Quick or Full): No time limit
77+
> - Scheduled Full Scans or MpCmdRun -scan: 7 day limit
78+
> - Scheduled Quick Scans or MpCmdRun -scan: 1 day limit
79+
7480
## Common errors in running commands via mpcmdrun.exe
7581

7682
The following table lists common errors that can occur while using the MpCmdRun tool.

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -76,10 +76,10 @@ You can enable attack surface reduction rules by using any of these methods:
7676
- [Microsoft Intune](#intune)
7777
- [Mobile Device Management (MDM)](#mdm)
7878
- [Microsoft Configuration Manager](#microsoft-configuration-manager)
79-
- [Group Policy](#group-policy)
79+
- [Group policy (GP)](#group-policy)
8080
- [PowerShell](#powershell)
8181

82-
Enterprise-level management such as Intune or Microsoft Configuration Manager is recommended. Enterprise-level management overwrites any conflicting Group Policy or PowerShell settings on startup.
82+
Enterprise-level management such as Intune or Microsoft Configuration Manager is recommended. Enterprise-level management overwrites any conflicting group policy or PowerShell settings on startup.
8383

8484
## Exclude files and folders from attack surface reduction rules
8585

@@ -93,7 +93,8 @@ When adding exclusions, keep these points in mind:
9393

9494
* Exclusions are typically based on individual files or folders (using folder paths or the full path of the file to be excluded).
9595
* Exclusion paths can use environment variables and wildcards. See [Use wildcards in the file name and folder path or extension exclusion lists](configure-extension-file-exclusions-microsoft-defender-antivirus.md#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists)
96-
* When deployed through Group Policy or PowerShell, exclusions apply to all attack surface reduction rules. Using Intune, it is possible to configure an exclusion for a specific attack surface reduction rule. See [Configure attack surface reduction rules per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-attack-surface-reduction-per-rule-exclusions)
96+
* When deployed through group policy or PowerShell, exclusions apply to all attack surface reduction rules. Using Intune, it is possible to configure an exclusion for a specific attack surface reduction rule. See [Configure attack surface reduction rules per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-attack-surface-reduction-per-rule-exclusions).
97+
9798
* Exclusions can be added based on certificate and file hashes, by allowing specified Defender for Endpoint file and certificate indicators. See [Overview of indicators](indicators-overview.md).
9899

99100
## Policy Conflict
@@ -117,7 +118,7 @@ This section provides configuration details for the following configuration meth
117118
- [Custom profile in Intune](#custom-profile-in-intune)
118119
- [MDM](#mdm)
119120
- [Microsoft Configuration Manager](#microsoft-configuration-manager)
120-
- [Group Policy](#group-policy)
121+
- [Group policy](#group-policy)
121122
- [PowerShell](#powershell)
122123

123124
The following procedures for enabling attack surface reduction rules include instructions for how to exclude files and folders.
@@ -267,12 +268,12 @@ Example:
267268
6. After the policy is created, select **Close**.
268269

269270
> [!WARNING]
270-
> There is a known issue with the applicability of Attack Surface Reduction on Server OS versions which is marked as compliant without any actual enforcement. Currently, there is no ETA for when this will be fixed.
271+
> There is a known issue with the applicability of attack surface reduction on Server OS versions which is marked as compliant without any actual enforcement. Currently, there is no defined release date for when this will be fixed.
271272
272-
### Group Policy
273+
### Group policy
273274

274275
> [!WARNING]
275-
> If you manage your computers and devices with Intune, Configuration Manager, or other enterprise-level management platform, the management software will overwrite any conflicting Group Policy settings on startup.
276+
> If you manage your computers and devices with Intune, Configuration Manager, or other enterprise-level management platform, the management software will overwrite any conflicting group policy settings on startup.
276277
277278
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and select **Edit**.
278279

defender-endpoint/microsoft-defender-antivirus-on-windows-server.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ sc query state= all
107107
108108
To get your regular security intelligence updates, the Windows Update service must be running. If you use an update management service, like Windows Server Update Services (WSUS), make sure Microsoft Defender Antivirus Security intelligence updates are approved for the computers you manage.
109109

110-
By default, Windows Update doesn't download and install updates automatically on Windows Server 2019 or Windows Server 2022, or Windows Server 2016. You can change this configuration by using one of the following methods:
110+
By default, Windows Update doesn't download and install updates automatically on Windows Server 2016, Windows Server 2019 or Windows Server 2022. You can change this configuration by using one of the following methods:
111111

112112
| Method | Description |
113113
|---|---|
@@ -155,7 +155,7 @@ To enable automatic sample submission, start a Windows PowerShell console as an
155155
156156
## Configure automatic exclusions
157157

158-
To help ensure security and performance, certain exclusions are automatically added based on the roles and features you install when using Microsoft Defender Antivirus on Windows Server 2016 or 2019, or Windows Server 2022.
158+
To help ensure security and performance, certain exclusions are automatically added based on the roles and features you install when using Microsoft Defender Antivirus on Windows Server 2016 or Windows Server 2019, or Windows Server 2022.
159159

160160
See [Configure exclusions in Microsoft Defender Antivirus on Windows Server](configure-server-exclusions-microsoft-defender-antivirus.md).
161161

0 commit comments

Comments
 (0)