You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -114,21 +114,21 @@ This configuration is possible when the devices have the share and read access (
114
114
115
115
5. Specify `PowerShell` in the **Program/Script** field.
116
116
117
-
In the **Add arguements** field, type `-ExecutionPolicy Bypass c:\wdav-update\vdmdlunpack.ps1`, and then select **OK**.
117
+
6.In the **Add arguements** field, type `-ExecutionPolicy Bypass c:\wdav-update\vdmdlunpack.ps1`, and then select **OK**.
118
118
119
-
4. Configure any other settings as appropriate.
119
+
7. Configure any other settings as appropriate.
120
120
121
-
5. Select **OK** to save the scheduled task.
121
+
8. Select **OK** to save the scheduled task.
122
122
123
-
You can initiate the update manually by right-clicking on the task and then selecting**Run**.
123
+
To initiate the update manually, right-click on the task, and then select**Run**.
124
124
125
125
### Download and unpackage manually
126
126
127
127
If you would prefer to do everything manually, here's what to do to replicate the script's behavior:
128
128
129
-
1. Create a new folder on the system root called `wdav_update` to store intelligence updates, for example, create the folder `c:\wdav_update`.
129
+
1. Create a new folder on the system root called `wdav_update` to store intelligence updates. For example, create the folder `c:\wdav_update`.
130
130
131
-
2. Create a subfolder under *wdav_update* with a GUID name, such as `{00000000-0000-0000-0000-000000000000}`
131
+
2. Create a subfolder under `wdav_update` with a GUID name, such as `{00000000-0000-0000-0000-000000000000}`
132
132
133
133
Here's an example: `c:\wdav_update\{00000000-0000-0000-0000-000000000000}`
134
134
@@ -137,7 +137,7 @@ If you would prefer to do everything manually, here's what to do to replicate th
137
137
138
138
3. Download a security intelligence package from [https://www.microsoft.com/wdsi/definitions](https://www.microsoft.com/wdsi/definitions) into the GUID folder. The file should be named `mpam-fe.exe`.
139
139
140
-
4. Open a cmd prompt window and navigate to the GUID folder you created. Use the **/X** extraction command to extract the files, for example `mpam-fe.exe /X`.
140
+
4. Open a Command Prompt window and navigate to the GUID folder you created. Use the `/X` extraction command to extract the files. For example `mpam-fe.exe /X`.
141
141
142
142
> [!NOTE]
143
143
> The VMs will pick up the updated package whenever a new GUID folder is created with an extracted update package or whenever an existing folder is updated with a new extracted package.
0 commit comments