Skip to content

Commit 5dc9182

Browse files
committed
Update deployment-vdi-microsoft-defender-antivirus.md
1 parent c54206b commit 5dc9182

File tree

1 file changed

+22
-16
lines changed

1 file changed

+22
-16
lines changed

defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md

Lines changed: 22 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Configure Microsoft Defender Antivirus on a remote desktop or virtual desktop infrastructure environment
33
description: Get an overview of how to configure Microsoft Defender Antivirus in a remote desktop or non-persistent virtual desktop environment.
44
ms.localizationpriority: medium
5-
ms.date: 08/22/2023
5+
ms.date: 09/27/2024
66
ms.topic: conceptual
77
author: denisebmsft
88
ms.author: deniseb
@@ -85,30 +85,36 @@ This configuration is possible when the devices have the share and read access (
8585

8686
1. Create an SMB/CIFS file share.
8787

88-
1. Use the following example to create a file share with the following share permissions.
88+
2. Use the following example to create a file share with the following share permissions.
8989

90-
```PowerShell
91-
PS c:\> Get-SmbShareAccess -Name mdatp$
92-
93-
Name ScopeName AccountName AccessControlType AccessRight
94-
---- --------- ----------- ----------------- -----------
95-
mdatp$ * Everyone Allow Read
96-
```
90+
```PowerShell
91+
92+
PS c:\> Get-SmbShareAccess -Name mdatp$
9793
98-
> [!NOTE]
99-
> An NTFS permission is added for **Authenticated Users:Read:**.
94+
Name ScopeName AccountName AccessControlType AccessRight
95+
---- --------- ----------- ----------------- -----------
96+
mdatp$ * Everyone Allow Read
97+
98+
```
10099

101-
For this example, the file share is:
100+
> [!NOTE]
101+
> An NTFS permission is added for **Authenticated Users:Read:**.
102102
103-
`\\WindowsFileServer.fqdn\mdatp$\wdav-update`
103+
For this example, the file share is `\\WindowsFileServer.fqdn\mdatp$\wdav-update`.
104104

105105
### Set a scheduled task to run the PowerShell script
106106

107-
1. On the management machine, open the Start menu and type **Task Scheduler**. Open it and select **Create task...** on the side panel.
107+
1. On the management machine, open the Start menu and type `Task Scheduler`. From the reasults, Task Scheduler and then select **Create task...** on the side panel.
108+
109+
2. Specify the name as `Security intelligence unpacker`.
110+
111+
3. On the **Trigger** tab, select **New...** > **Daily**, and select **OK**.
112+
113+
4. On the **Actions** tab, select **New...**.
108114

109-
2. Enter the name as **Security intelligence unpacker**. Go to the **Trigger** tab. Select **New...** \> **Daily**, and select **OK**.
115+
5. Specify `PowerShell` in the **Program/Script** field.
110116

111-
3. Go to the **Actions** tab. Select **New...** Enter **PowerShell** in the **Program/Script** field. Enter `-ExecutionPolicy Bypass c:\wdav-update\vdmdlunpack.ps1` in the **Add arguments** field. Select **OK**.
117+
In the **Add arguements** field, type `-ExecutionPolicy Bypass c:\wdav-update\vdmdlunpack.ps1`, and then select **OK**.
112118

113119
4. Configure any other settings as appropriate.
114120

0 commit comments

Comments
 (0)