You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/validate-antimalware.md
+18-12Lines changed: 18 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,41 +31,48 @@ Scenario requirements and setup
31
31
32
32
- Windows 11, Windows 10, Windows 8.1, Windows 7 SP1
33
33
34
-
- Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012, and Windows Server 2008 R2
34
+
- Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012, Windows Server 2008 R2
35
35
36
36
- Linux
37
37
38
38
- macOS
39
39
40
-
- Microsoft Defender Real-time protection is enabled
40
+
- Microsoft Defender real-time protection is enabled
41
41
42
42
## EICAR test file to simulate malware
43
43
44
-
After you enable Microsoft Defender for Endpoint or Microsoft Defender for Business or Microsoft Defender Antivirus, you can test the service and run a proof of concept to familiarize yourself with its feature and validate the advanced security capabilities effectively protect your device by generating real security alerts.
44
+
After you enable Microsoft Defender for Endpoint, Microsoft Defender for Business, or Microsoft Defender Antivirus, you can test the service and run a proof of concept to familiarize yourself with the features. You can also generate real security alerts and validate the advanced security capabilities effectively protect your device.
45
45
46
-
Run an AV detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
46
+
Run an antivirus detection test to verify a device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
47
47
48
48
### Windows
49
49
50
50
1. Prepare for the EICAR test file:
51
51
52
-
1. Use an EICAR test file instead of real malware to avoid causing damage. Microsoft Defender Antivirus treats EICAR test files as malware.
52
+
- Use an EICAR test file instead of real malware to avoid causing damage
53
+
54
+
- Microsoft Defender Antivirus treats EICAR test files as malware
55
+
56
+
- You will create the test file in the next step
53
57
54
58
1. Create the EICAR test file:
55
59
56
-
1. Copy the following string: `X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*`
60
+
a. Copy the following string: `X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*`
57
61
58
-
1. Paste the string into a .TXT file and save it as EICAR.txt
62
+
b. Paste the string into a .TXT file and save it as EICAR.txt
63
+
64
+
c. Verify the test file is immediately quarantined by Defender
65
+
59
66
60
-
### Linux/macOS
67
+
### Linux and macOS
61
68
62
-
1.Ensure that real-time protection is enabled. Run the following command and confirm the output is `"true"`:
69
+
1.Verify that real-time protection is enabled. Run the following command and confirm the output is `"true"`:
63
70
64
71
```
65
72
mdatp health --field real_time_protection_enabled
66
73
```
67
74
68
-
2. Download the EICAR test file. Open a Terminal window and execute the appropriate command for your operating system:
75
+
2. Run one of the following commands to download the EICAR test file:
69
76
70
77
Linux:
71
78
@@ -79,9 +86,8 @@ Run an AV detection test to verify that the device is properly onboarded and rep
0 commit comments