Skip to content

Commit 55b2910

Browse files
committed
Update evaluate-mdav-using-gp.md
1 parent aa1d68c commit 55b2910

File tree

1 file changed

+23
-23
lines changed

1 file changed

+23
-23
lines changed

defender-endpoint/evaluate-mdav-using-gp.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: conceptual
77
author: emmwalshh
88
ms.author: ewalsh
99
ms.custom: nextgen
10-
ms.date: 05/10/2024
10+
ms.date: 02/12/2025
1111
ms.reviewer: yongrhee
1212
manager: deniseb
1313
ms.subservice: ngp
@@ -34,22 +34,22 @@ search.appverid: met150
3434

3535
In Windows 10 or newer and Windows Server 2016 or newer, you can use next-generation protection features offered by Microsoft Defender Antivirus (MDAV) and Microsoft Defender Exploit Guard (Microsoft Defender EG).
3636

37-
This topic explains how to enable and test the key protection features in Microsoft Defender AV and Microsoft Defender EG and provides you with guidance and links to more information.
37+
This article explains how to enable and test the key protection features in Microsoft Defender AV and Microsoft Defender EG and provides you with guidance and links to more information.
3838

3939
This article describes configuration options in Windows 10 or newer and Windows Server 2016 or newer.
4040

4141
## Use Microsoft Defender Antivirus using Group Policy to enable the features
4242

4343
This guide provides the Microsoft Defender Antivirus Group Policy that configures the features you should use to evaluate our protection.
4444

45-
1. Grab the latest 'Windows Group Policy Administrative Templates'.
45+
1. Grab the latest 'Windows Group Policy Administrative Templates.'
4646

4747
For more information, see [Create and manage Central Store - Windows Client](/troubleshoot/windows-client/group-policy/create-and-manage-central-store#links-to-download-the-administrative-templates-files-based-on-the-operating-system-version).
4848

4949
> [!TIP]
5050
> 1. The Windows one works with the Windows Servers.
5151
>
52-
> 1. Even if you are running a Windows 10 or Windows Server 2016, get the latest administrative templates for Windows 11 or newer.
52+
> 1. Even if you're running a Windows 10 or Windows Server 2016, get the latest administrative templates for Windows 11 or newer.
5353
5454
2. Create a 'Central Store' to host the latest .admx and .adml templates.
5555

@@ -59,21 +59,21 @@ This guide provides the Microsoft Defender Antivirus Group Policy that configure
5959

6060
1. Create a new OU block policy inheritance.
6161

62-
1. Open Group policy Management Console (GPMC.msc).
62+
2. Open Group policy Management Console (GPMC.msc).
6363

64-
1. Go to **Group Policy Objects** and create a new Group Policy.
64+
3. Go to **Group Policy Objects** and create a new Group Policy.
6565

66-
1. Right-click the new policy created and select **Edit**.
66+
4. Right-click the new policy created and select **Edit**.
6767

68-
1. Navigate to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
68+
5. Navigate to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
6969

7070
or
7171

7272
If joined to a workgroup
7373

74-
1. Open Group Policy Editor MMC (GPEdit.msc).
74+
6. Open Group Policy Editor MMC (GPEdit.msc).
7575

76-
2. Navigate to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
76+
7. Navigate to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
7777

7878
## MDAV and Potentially Unwanted Applications (PUA)
7979

@@ -179,14 +179,14 @@ Disable local administrator AV settings such as exclusions, and enforce the poli
179179
| Description | Setting |
180180
| --- | --- |
181181
| Prevent users and apps from accessing dangerous websites | Enabled, Block |
182-
| This settings controls whether Network Protection is allowed to be configured into block or audit mode on Windows Server | Enabled |
182+
| This settings controls whether Network Protection can be configured into block or audit mode on Windows Server | Enabled |
183183

184-
To enable Network Protection for Windows Servers, for now, please use Powershell:
184+
To enable Network Protection for Windows Servers, for now, please use PowerShell:
185185

186-
| OS | Powershell cmdlet |
186+
| OS | PowerShell cmdlet |
187187
| --- | --- |
188188
| Windows Server 2012 R2Windows Server 2022 and later | set-MpPreference -AllowNetworkProtectionOnWinServer $true |
189-
| Windows Server 2016 and Windows Server 2012 R2 [unified MDE client](/defender-endpoint/update-agent-mma-windows#upgrade-to-the-new-unified-agent-for-defender-for-endpoint) | set-MpPreference -AllowNetworkProtectionOnWinServer $true and set-MpPreference -AllowNetworkProtectionDownLevel $true
189+
| Windows Server 2016 and Windows Server 2012 R2 [unified MDE client](/defender-endpoint/update-agent-mma-windows#upgrade-to-the-new-unified-agent-for-defender-for-endpoint) | set-MpPreference -AllowNetworkProtectionOnWinServer $true and set-MpPreference -AllowNetworkProtectionDownLevel $ true
190190

191191
## Attack Surface Reduction Rules
192192

@@ -204,7 +204,7 @@ To enable Network Protection for Windows Servers, for now, please use Powershell
204204
| 01443614-cd74-433a-b99e-2ecdc07bfc25<br><br>**Note:** (Block executable files from running unless they meet a prevalence, age, or trusted list criterion) | 1 (Block) |
205205
| 26190899-1602-49e8-8b27-eb1d0a1ce869<br><br>**Note:** (Block Office communication application from creating child processes) | 1 (Block) |
206206
| d4f940ab-401b-4efc-aadc-ad5f3c50688a<br><br>**Note:** (Block all Office applications from creating child processes) | 1 (Block) |
207-
| c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb<br><br>**Note:** ( [PREVIEW] Block use of copied or impersonated system tools) | 1 (Block) |
207+
| c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb<br><br>**Note:** ([PREVIEW] Block use of copied or impersonated system tools) | 1 (Block) |
208208
| d3e037e1-3eb8-44c8-a917-57927947596d<br><br>**Note:** (Block JavaScript or VBScript from launching downloaded executable content) | 1 (Block) |
209209
| 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2<br><br>**Note:** (Block credential stealing from the Windows local security authority subsystem) | 1 (Block) |
210210
| a8f5898e-1dc8-49a9-9878-85004b8a61e6<br><br>**Note:** (Block Web shell creation for Servers) | 1 (Block) |
@@ -214,10 +214,10 @@ To enable Network Protection for Windows Servers, for now, please use Powershell
214214
| e6db77e5-3df2-4cf1-b95a-636979351e5b<br><br>**Note:** (Block persistence through WMI event subscription) | 1 (Block) |
215215
| c1db55ab-c21a-4637-bb3f-a12568109d35<br><br>**Note:** (Use advanced protection against ransomware) | 1 (Block) |
216216
| d1e49aac-8f56-4280-b9ba-993a6d77406c<br><br>**Note:** (Block process creations originating from PSExec and WMI commands) | 1 (Block)<br><br>**Note:** If you have Configuration Manager (formerly SCCM), or other management tools that use WMI, you might need to set this to 2 ('audit') instead of 1('block'). |
217-
| 33ddedf1-c6e0-47cb-833e-de6133960387<br><br>**Note:** ( [PREVIEW] Block rebooting machine in Safe Mode) | 1 (Block) |
217+
| 33ddedf1-c6e0-47cb-833e-de6133960387<br><br>**Note:** ([PREVIEW] Block rebooting machine in Safe Mode) | 1 (Block) |
218218

219219
> [!TIP]
220-
> Some rules may block behavior you find acceptable in your organization. In these cases, change the rule from 'Enabled' to 'Audit' to prevent unwanted blocks.
220+
> Some rules might block behavior you find acceptable in your organization. In these cases, change the rule from 'Enabled' to 'Audit' to prevent unwanted blocks.
221221
222222
## Controlled Folder Access
223223

@@ -237,7 +237,7 @@ For more information [How do I configure or manage tamper protection?](/defender
237237

238238
#### Check the Cloud Protection network connectivity
239239

240-
It is important to check that the Cloud Protection network connectivity is working during your pen testing.
240+
It's important to check that the Cloud Protection network connectivity is working during your pen testing.
241241

242242
CMD (Run as admin)
243243

@@ -255,7 +255,7 @@ The latest 'Platform Update' version Production channel (GA) is available here:
255255

256256
[Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623+update)
257257

258-
To check which 'Platform Update' version you have installed, use the following PowerShell command (Run as admin):
258+
To check which 'Platform Update' version is installed, use the following PowerShell command (Run as admin):
259259

260260
```powershell
261261
get-mpComputerStatus | ft AMProductVersion
@@ -265,9 +265,9 @@ get-mpComputerStatus | ft AMProductVersion
265265

266266
The latest 'Security Intelligence Update' version is available here:
267267

268-
[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates)
268+
[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates)
269269

270-
To check which 'Security Intelligence Update' version you have installed, use the following PowerShell command (Run as admin):
270+
To check which 'Security Intelligence Update' version is installed, use the following PowerShell command (Run as admin):
271271

272272
```PowerShell
273273
get-mpComputerStatus | ft AntivirusSignatureVersion
@@ -277,9 +277,9 @@ get-mpComputerStatus | ft AntivirusSignatureVersion
277277

278278
The latest scan 'engine update' version is available here:
279279

280-
[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates)
280+
[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates)
281281

282-
To check which 'Engine Update' version you have installed, use the following PowerShell command(Run as admin):
282+
To check which 'Engine Update' version is installed, use the following PowerShell command(Run as admin):
283283

284284
```PowerShell
285285
get-mpComputerStatus | ft AMEngineVersion

0 commit comments

Comments
 (0)