Skip to content

Commit 4c5aee9

Browse files
committed
Update evaluate-mda-using-mde-security-settings-management.md
1 parent d2f3761 commit 4c5aee9

File tree

1 file changed

+16
-16
lines changed

1 file changed

+16
-16
lines changed

defender-endpoint/evaluate-mda-using-mde-security-settings-management.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -17,14 +17,14 @@ ms.custom:
1717
- cx-ean
1818
ms.subservice: edr
1919
search.appverid: met150
20-
ms.date: 10/30/2024
20+
ms.date: 02/12/2025
2121
---
2222

2323
# Evaluate Microsoft Defender Antivirus using Microsoft Defender Endpoint Security Settings Management (Endpoint security policies)
2424

2525
In Windows 10 or later, and in Windows Server 2016 or later, you can use next-generation protection features offered by Microsoft Defender Antivirus (MDAV) and Microsoft Defender Exploit Guard (Microsoft Defender EG).
2626

27-
This article describes configuration options in Windows 10 or later, and in Windows Server 2016 or later, that guide you to activate and test the key protection features in MDAV and Microsoft Defender EG; and provides you with guidance and with links to more information.
27+
This article outlines the configuration options available in Windows 10 and later versions, as well as in Windows Server 2016 and later versions. It provides step-by-step guidance on how to activate and test the key protection features in Microsoft Defender Antivirus (MDAV) and Microsoft Defender for Endpoint (EG).
2828

2929
If you have any questions about a detection that MDAV makes, or you discover a missed detection, you can submit a file to us at our [sample submission help site](/defender-xdr/submission-guide).
3030

@@ -53,7 +53,7 @@ To configure the options that you must use to test the protection features, perf
5353

5454
|Description|Settings|
5555
|---|---|
56-
|Allow Realtime Monitoring|Allowed|
56+
|Allow Real-time Monitoring|Allowed|
5757
|Real Time Scan Direction|Monitor all files (bi-directional)|
5858
|Allow Behavior Monitoring|Allowed|
5959
|Allow On Access Protection|Allowed|
@@ -65,7 +65,7 @@ To configure the options that you must use to test the protection features, perf
6565
|---|---|
6666
|Allow Cloud Protection|Allowed|
6767
|Cloud Block Level|High|
68-
|Cloud Extended Timeout|Configured, 50|
68+
|Cloud Extended Time-out|Configured, 50|
6969
|Submit Samples Consent|Send all samples automatically|
7070

7171
Standard security intelligence updates can take hours to prepare and deliver; our cloud-delivered protection service can deliver this protection in seconds. For more information, see [Use next-gen technologies in Microsoft Defender Antivirus through cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md).
@@ -86,7 +86,7 @@ Standard security intelligence updates can take hours to prepare and deliver; ou
8686
|Description|Setting|
8787
|---|---|
8888
|Enable Network Protection|Enabled (block mode)|
89-
|Allow Network Protection Down Level|Network protection will be enabled downlevel.|
89+
|Allow Network Protection Down Level|Network protection is enabled downlevel.|
9090
|Allow Datagram Processing On Win Server|Datagram processing on Windows Server is enabled.|
9191
|Disable DNS over TCP parsing|DNS over TCP parsing is enabled.|
9292
|Disable HTTP parsing|HTTP parsing is enabled.|
@@ -158,23 +158,23 @@ To enable Attack Surface Reduction (ASR) rules using the endpoint security polic
158158
|[PREVIEW] Block use of copied or impersonated system tools|Block|
159159
|Block JavaScript or VBScript from launching downloaded executable content|Block|
160160
|Block credential stealing from the Windows local security authority subsystem|Block|
161-
|Block Webshell creation for Servers|Block|
161+
|Block Web shell creation for Servers|Block|
162162
|Block Office applications from creating executable content|Block|
163163
|Block untrusted and unsigned processes that run from USB|Block|
164164
|Block Office applications from injecting code into other processes|Block|
165165
|Block persistence through WMI event subscription|Block|
166166
|Use advanced protection against ransomware|Block|
167-
|Block process creations originating from PSExec and WMI commands|Block <br/> **NOTE**: If you have Configuration Manager (formerly SCCM), or other management tools, that use WMI, you might need to set this to **Audit** instead of **Block**.|
167+
|Block process creations originating from PSExec and WMI commands|Block <br/> **NOTE**: If you have Configuration Manager (formerly SCCM), or other management tools that use WMI you might need to set this to **Audit** instead of **Block**.|
168168
|[PREVIEW] Block rebooting machine in Safe Mode|Block|
169169
|Enable Controlled Folder Access|Enabled|
170170

171171
> [!TIP]
172-
> Any of the rules may block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named "Attack Surface Reduction Only Exclusions". And, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
172+
> Any of the rules might block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named "Attack Surface Reduction Only Exclusions." Additionally, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
173173
174174
1. Select **Next**.
175-
1. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
176-
1. Select **Next**.
177-
1. On the **Review + create** tab, review your policy settings, and then select **Save**.
175+
2. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
176+
3. Select **Next**.
177+
4. On the **Review + create** tab, review your policy settings, and then select **Save**.
178178

179179
#### Enable Tamper Protection
180180

@@ -186,16 +186,16 @@ To enable Attack Surface Reduction (ASR) rules using the endpoint security polic
186186
1. On the **Basics** page, enter a name and description for the profile in the **Name** and **Description** fields, respectively.
187187
1. Select **Next**.
188188
1. On the **Configuration settings** page, expand the groups of settings.
189-
1. From these groups of settings, select those settings that you want to manage with this profile.
190-
1. Set the policies for the chosen groups of settings by configuring the settings as described in the following tables:
189+
1. From these groups, select the settings that you want to manage with this profile.
190+
1. Set the policies for the chosen groups of settings by configuring the them as described in the following tables:
191191

192192
|Description| Setting|
193193
| -------- | -------- |
194194
| TamperProtection (Device) | On|
195195

196196
#### Check the Cloud Protection network connectivity
197197

198-
It is important to check that the Cloud Protection network connectivity is working during your pen testing.
198+
It's important to check that the Cloud Protection network connectivity is working during your pen testing.
199199

200200
CMD (Run as admin)
201201

@@ -219,7 +219,7 @@ Get-MPComputerStatus | Format-Table AMProductVersion
219219

220220
#### Check the Security Intelligence Update version
221221

222-
The latest "Security Intelligence Update" version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
222+
The latest "Security Intelligence Update" version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
223223

224224
To check which "Security Intelligence Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
225225

@@ -229,7 +229,7 @@ Get-MPComputerStatus | Format-Table AntivirusSignatureVersion
229229

230230
#### Check the Engine Update version
231231

232-
The latest scan "engine update" version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
232+
The latest scan "engine update" version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
233233

234234
To check which "Engine Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
235235

0 commit comments

Comments
 (0)