Skip to content

Commit 503540e

Browse files
committed
Finalized draft edits
1 parent ed38ff8 commit 503540e

File tree

1 file changed

+18
-12
lines changed

1 file changed

+18
-12
lines changed

defender-endpoint/validate-antimalware.md

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -31,41 +31,48 @@ Scenario requirements and setup
3131

3232
- Windows 11, Windows 10, Windows 8.1, Windows 7 SP1
3333

34-
- Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012, and Windows Server 2008 R2
34+
- Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012, Windows Server 2008 R2
3535

3636
- Linux
3737

3838
- macOS
3939

40-
- Microsoft Defender Real-time protection is enabled
40+
- Microsoft Defender real-time protection is enabled
4141

4242
## EICAR test file to simulate malware
4343

44-
After you enable Microsoft Defender for Endpoint or Microsoft Defender for Business or Microsoft Defender Antivirus, you can test the service and run a proof of concept to familiarize yourself with its feature and validate the advanced security capabilities effectively protect your device by generating real security alerts.
44+
After you enable Microsoft Defender for Endpoint, Microsoft Defender for Business, or Microsoft Defender Antivirus, you can test the service and run a proof of concept to familiarize yourself with the features. You can also generate real security alerts and validate the advanced security capabilities effectively protect your device.
4545

46-
Run an AV detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
46+
Run an antivirus detection test to verify a device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
4747

4848
### Windows
4949

5050
1. Prepare for the EICAR test file:
5151

52-
1. Use an EICAR test file instead of real malware to avoid causing damage. Microsoft Defender Antivirus treats EICAR test files as malware.
52+
- Use an EICAR test file instead of real malware to avoid causing damage
53+
54+
- Microsoft Defender Antivirus treats EICAR test files as malware
55+
56+
- You will create the test file in the next step
5357

5458
1. Create the EICAR test file:
5559

56-
1. Copy the following string: `X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*`
60+
a. Copy the following string: `X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*`
5761

58-
1. Paste the string into a .TXT file and save it as EICAR.txt
62+
b. Paste the string into a .TXT file and save it as EICAR.txt
63+
64+
c. Verify the test file is immediately quarantined by Defender
65+
5966
60-
### Linux/macOS
67+
### Linux and macOS
6168

62-
1. Ensure that real-time protection is enabled. Run the following command and confirm the output is `"true"`:
69+
1. Verify that real-time protection is enabled. Run the following command and confirm the output is `"true"`:
6370

6471
```
6572
mdatp health --field real_time_protection_enabled
6673
```
6774
68-
2. Download the EICAR test file. Open a Terminal window and execute the appropriate command for your operating system:
75+
2. Run one of the following commands to download the EICAR test file:
6976
7077
Linux:
7178
@@ -79,9 +86,8 @@ Run an AV detection test to verify that the device is properly onboarded and rep
7986
curl -o ~/Downloads/eicar.com.txt https://secure.eicar.org/eicar.com.txt
8087
```
8188
82-
3. Verify that the file has been quarantined by Defender for Endpoint.** Run the following command to list all detected threats:
89+
3. Run the following command to list all detected threats and verify the test file has been quarantined by Defender for Endpoint:
8390
8491
```
8592
mdatp threat list
8693
```
87-

0 commit comments

Comments
 (0)