You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/evaluate-mdav-using-gp.md
+23-23Lines changed: 23 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.topic: conceptual
7
7
author: emmwalshh
8
8
ms.author: ewalsh
9
9
ms.custom: nextgen
10
-
ms.date: 05/10/2024
10
+
ms.date: 02/12/2025
11
11
ms.reviewer: yongrhee
12
12
manager: deniseb
13
13
ms.subservice: ngp
@@ -34,22 +34,22 @@ search.appverid: met150
34
34
35
35
In Windows 10 or newer and Windows Server 2016 or newer, you can use next-generation protection features offered by Microsoft Defender Antivirus (MDAV) and Microsoft Defender Exploit Guard (Microsoft Defender EG).
36
36
37
-
This topic explains how to enable and test the key protection features in Microsoft Defender AV and Microsoft Defender EG and provides you with guidance and links to more information.
37
+
This article explains how to enable and test the key protection features in Microsoft Defender AV and Microsoft Defender EG and provides you with guidance and links to more information.
38
38
39
39
This article describes configuration options in Windows 10 or newer and Windows Server 2016 or newer.
40
40
41
41
## Use Microsoft Defender Antivirus using Group Policy to enable the features
42
42
43
43
This guide provides the Microsoft Defender Antivirus Group Policy that configures the features you should use to evaluate our protection.
44
44
45
-
1. Grab the latest 'Windows Group Policy Administrative Templates'.
45
+
1. Grab the latest 'Windows Group Policy Administrative Templates.'
46
46
47
47
For more information, see [Create and manage Central Store - Windows Client](/troubleshoot/windows-client/group-policy/create-and-manage-central-store#links-to-download-the-administrative-templates-files-based-on-the-operating-system-version).
48
48
49
49
> [!TIP]
50
50
> 1. The Windows one works with the Windows Servers.
51
51
>
52
-
> 1. Even if you are running a Windows 10 or Windows Server 2016, get the latest administrative templates for Windows 11 or newer.
52
+
> 1. Even if you're running a Windows 10 or Windows Server 2016, get the latest administrative templates for Windows 11 or newer.
53
53
54
54
2. Create a 'Central Store' to host the latest .admx and .adml templates.
55
55
@@ -59,21 +59,21 @@ This guide provides the Microsoft Defender Antivirus Group Policy that configure
59
59
60
60
1. Create a new OU block policy inheritance.
61
61
62
-
1. Open Group policy Management Console (GPMC.msc).
62
+
2. Open Group policy Management Console (GPMC.msc).
63
63
64
-
1. Go to **Group Policy Objects** and create a new Group Policy.
64
+
3. Go to **Group Policy Objects** and create a new Group Policy.
65
65
66
-
1. Right-click the new policy created and select **Edit**.
66
+
4. Right-click the new policy created and select **Edit**.
## MDAV and Potentially Unwanted Applications (PUA)
79
79
@@ -179,14 +179,14 @@ Disable local administrator AV settings such as exclusions, and enforce the poli
179
179
| Description | Setting |
180
180
| --- | --- |
181
181
| Prevent users and apps from accessing dangerous websites | Enabled, Block |
182
-
| This settings controls whether Network Protection is allowed to be configured into block or audit mode on Windows Server | Enabled |
182
+
| This settings controls whether Network Protection can be configured into block or audit mode on Windows Server | Enabled |
183
183
184
-
To enable Network Protection for Windows Servers, for now, please use Powershell:
184
+
To enable Network Protection for Windows Servers, for now, please use PowerShell:
185
185
186
-
| OS |Powershell cmdlet |
186
+
| OS |PowerShell cmdlet |
187
187
| --- | --- |
188
188
| Windows Server 2012 R2Windows Server 2022 and later | set-MpPreference -AllowNetworkProtectionOnWinServer $true |
189
-
| Windows Server 2016 and Windows Server 2012 R2 [unified MDE client](/defender-endpoint/update-agent-mma-windows#upgrade-to-the-new-unified-agent-for-defender-for-endpoint) | set-MpPreference -AllowNetworkProtectionOnWinServer $true and set-MpPreference -AllowNetworkProtectionDownLevel $true
189
+
| Windows Server 2016 and Windows Server 2012 R2 [unified MDE client](/defender-endpoint/update-agent-mma-windows#upgrade-to-the-new-unified-agent-for-defender-for-endpoint) | set-MpPreference -AllowNetworkProtectionOnWinServer $true and set-MpPreference -AllowNetworkProtectionDownLevel $true
190
190
191
191
## Attack Surface Reduction Rules
192
192
@@ -204,7 +204,7 @@ To enable Network Protection for Windows Servers, for now, please use Powershell
204
204
| 01443614-cd74-433a-b99e-2ecdc07bfc25<br><br>**Note:** (Block executable files from running unless they meet a prevalence, age, or trusted list criterion) | 1 (Block) |
205
205
| 26190899-1602-49e8-8b27-eb1d0a1ce869<br><br>**Note:** (Block Office communication application from creating child processes) | 1 (Block) |
206
206
| d4f940ab-401b-4efc-aadc-ad5f3c50688a<br><br>**Note:** (Block all Office applications from creating child processes) | 1 (Block) |
207
-
| c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb<br><br>**Note:** ([PREVIEW] Block use of copied or impersonated system tools) | 1 (Block) |
207
+
| c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb<br><br>**Note:** ([PREVIEW] Block use of copied or impersonated system tools) | 1 (Block) |
208
208
| d3e037e1-3eb8-44c8-a917-57927947596d<br><br>**Note:** (Block JavaScript or VBScript from launching downloaded executable content) | 1 (Block) |
209
209
| 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2<br><br>**Note:** (Block credential stealing from the Windows local security authority subsystem) | 1 (Block) |
210
210
| a8f5898e-1dc8-49a9-9878-85004b8a61e6<br><br>**Note:** (Block Web shell creation for Servers) | 1 (Block) |
@@ -214,10 +214,10 @@ To enable Network Protection for Windows Servers, for now, please use Powershell
| d1e49aac-8f56-4280-b9ba-993a6d77406c<br><br>**Note:** (Block process creations originating from PSExec and WMI commands) | 1 (Block)<br><br>**Note:** If you have Configuration Manager (formerly SCCM), or other management tools that use WMI, you might need to set this to 2 ('audit') instead of 1('block'). |
> Some rules may block behavior you find acceptable in your organization. In these cases, change the rule from 'Enabled' to 'Audit' to prevent unwanted blocks.
220
+
> Some rules might block behavior you find acceptable in your organization. In these cases, change the rule from 'Enabled' to 'Audit' to prevent unwanted blocks.
221
221
222
222
## Controlled Folder Access
223
223
@@ -237,7 +237,7 @@ For more information [How do I configure or manage tamper protection?](/defender
237
237
238
238
#### Check the Cloud Protection network connectivity
239
239
240
-
It is important to check that the Cloud Protection network connectivity is working during your pen testing.
240
+
It's important to check that the Cloud Protection network connectivity is working during your pen testing.
241
241
242
242
CMD (Run as admin)
243
243
@@ -255,7 +255,7 @@ The latest 'Platform Update' version Production channel (GA) is available here:
To check which 'Platform Update' version you have installed, use the following PowerShell command (Run as admin):
258
+
To check which 'Platform Update' version is installed, use the following PowerShell command (Run as admin):
259
259
260
260
```powershell
261
261
get-mpComputerStatus | ft AMProductVersion
@@ -265,9 +265,9 @@ get-mpComputerStatus | ft AMProductVersion
265
265
266
266
The latest 'Security Intelligence Update' version is available here:
267
267
268
-
[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates)
268
+
[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates)
269
269
270
-
To check which 'Security Intelligence Update' version you have installed, use the following PowerShell command (Run as admin):
270
+
To check which 'Security Intelligence Update' version is installed, use the following PowerShell command (Run as admin):
271
271
272
272
```PowerShell
273
273
get-mpComputerStatus | ft AntivirusSignatureVersion
@@ -277,9 +277,9 @@ get-mpComputerStatus | ft AntivirusSignatureVersion
277
277
278
278
The latest scan 'engine update' version is available here:
279
279
280
-
[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates)
280
+
[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates)
281
281
282
-
To check which 'Engine Update' version you have installed, use the following PowerShell command(Run as admin):
282
+
To check which 'Engine Update' version is installed, use the following PowerShell command(Run as admin):
0 commit comments