Skip to content

Commit 5688e7b

Browse files
committed
Update deployment-vdi-microsoft-defender-antivirus.md
1 parent 5dc9182 commit 5688e7b

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -114,21 +114,21 @@ This configuration is possible when the devices have the share and read access (
114114

115115
5. Specify `PowerShell` in the **Program/Script** field.
116116

117-
In the **Add arguements** field, type `-ExecutionPolicy Bypass c:\wdav-update\vdmdlunpack.ps1`, and then select **OK**.
117+
6. In the **Add arguements** field, type `-ExecutionPolicy Bypass c:\wdav-update\vdmdlunpack.ps1`, and then select **OK**.
118118

119-
4. Configure any other settings as appropriate.
119+
7. Configure any other settings as appropriate.
120120

121-
5. Select **OK** to save the scheduled task.
121+
8. Select **OK** to save the scheduled task.
122122

123-
You can initiate the update manually by right-clicking on the task and then selecting **Run**.
123+
To initiate the update manually, right-click on the task, and then select **Run**.
124124

125125
### Download and unpackage manually
126126

127127
If you would prefer to do everything manually, here's what to do to replicate the script's behavior:
128128

129-
1. Create a new folder on the system root called `wdav_update` to store intelligence updates, for example, create the folder `c:\wdav_update`.
129+
1. Create a new folder on the system root called `wdav_update` to store intelligence updates. For example, create the folder `c:\wdav_update`.
130130

131-
2. Create a subfolder under *wdav_update* with a GUID name, such as `{00000000-0000-0000-0000-000000000000}`
131+
2. Create a subfolder under `wdav_update` with a GUID name, such as `{00000000-0000-0000-0000-000000000000}`
132132

133133
Here's an example: `c:\wdav_update\{00000000-0000-0000-0000-000000000000}`
134134

@@ -137,7 +137,7 @@ If you would prefer to do everything manually, here's what to do to replicate th
137137
138138
3. Download a security intelligence package from [https://www.microsoft.com/wdsi/definitions](https://www.microsoft.com/wdsi/definitions) into the GUID folder. The file should be named `mpam-fe.exe`.
139139

140-
4. Open a cmd prompt window and navigate to the GUID folder you created. Use the **/X** extraction command to extract the files, for example `mpam-fe.exe /X`.
140+
4. Open a Command Prompt window and navigate to the GUID folder you created. Use the `/X` extraction command to extract the files. For example `mpam-fe.exe /X`.
141141

142142
> [!NOTE]
143143
> The VMs will pick up the updated package whenever a new GUID folder is created with an extracted update package or whenever an existing folder is updated with a new extracted package.

0 commit comments

Comments
 (0)