Skip to content

Commit 61bc365

Browse files
authored
Merge pull request #154 from MicrosoftDocs/yongrhee
Update microsoft-defender-core-service-overview.md
2 parents 3cbd30a + 6a8e5c9 commit 61bc365

File tree

1 file changed

+51
-4
lines changed

1 file changed

+51
-4
lines changed

defender-endpoint/microsoft-defender-core-service-overview.md

Lines changed: 51 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,13 @@
11
---
22
title: Microsoft Defender Core service overview
33
description: Get an overview of Microsoft Defender Core service.
4-
author: siosulli
5-
ms.author: siosulli
6-
ms.reviewer: yongrhee
4+
author: YongRhee-MSFT
5+
ms.author: yongrhee
76
manager: deniseb
87
ms.service: defender-endpoint
98
ms.subservice: ngp
109
ms.topic: overview
11-
ms.date: 04/10/2024
10+
ms.date: 04/24/2024
1211
search.appverid: met150
1312
ms.localizationpriority: medium
1413
audience: ITPro
@@ -35,6 +34,10 @@ The Microsoft Defender Core service is releasing with [Microsoft Defender Antivi
3534

3635
- Mid June 2024 to U.S. Government customers running Windows clients and Windows Servers.
3736

37+
If you are using the Microsoft Defender for Endpoint **streamlined** device connectivity experience, you do not need to add any additional URLs.
38+
39+
If you are using the Microsoft Defender for Endpoint **standard** device connectivity experience:
40+
3841
- Enterprise customers should allow the following URLs:
3942

4043
- `*.events.data.microsoft.com`
@@ -43,6 +46,22 @@ The Microsoft Defender Core service is releasing with [Microsoft Defender Antivi
4346

4447
- `*.ecs.office.com`
4548

49+
- If you do not want to use the wildcards, you can use:
50+
51+
- `us-mobile.events.data.microsoft.com/OneCollector/1.0`
52+
53+
- `eu-mobile.events.data.microsoft.com/OneCollector/1.0`
54+
55+
- `uk-mobile.events.data.microsoft.com/OneCollector/1.0`
56+
57+
- `au-mobile.events.data.microsoft.com/OneCollector/1.0`
58+
59+
- `mobile.events.data.microsoft.com/OneCollector/1.0`
60+
61+
and
62+
63+
- `ecs.office.com/config/v1/MicrosoftWindowsDefenderClient`
64+
4665
- Enterprise U.S. Government customers should allow the following URLs:
4766

4867
- `*.events.data.microsoft.com`
@@ -71,3 +90,31 @@ The following table summarizes where you can view Microsoft Defender Antivirus p
7190

7291
To learn more about the Microsoft Defender Core service configurations and experimentation (ECS), see [Microsoft Defender Core service configurations and experimentation](microsoft-defender-core-service-configurations-and-experimentation.md).
7392

93+
Frequently Asked Questions (FAQ's):
94+
95+
Q: What's the recommendation for Microsoft Defender Core service?
96+
97+
A: We highly recommend to let the default settings of keeping the Microsoft Defender Core service running and reporting.
98+
99+
Q: What data storage and privacy does the Microsoft Defender Core service adhere to?
100+
101+
A: Please review [Microsoft Defender for Endpoint data storage and privacy](/microsoft-365/security/defender-endpoint/data-storage-privacy)
102+
103+
Q: Does the [MDE Client Analyzer](/microsoft-365/security/defender-endpoint/run-analyzer-windows) check the URL's for Microsoft Defender for Endpoint **standard** device connectivity experience?
104+
105+
A: Not yet, work is in progress to include these new URL's.
106+
107+
Q: Can I enforce keeping the Microsoft Defender Core service running as an Administrator?
108+
109+
A: Yes, you can enforce it by using any of these management tools:
110+
111+
112+
|Management tool| Description|
113+
| -------- | -------- |
114+
| Microsoft Defender for Endpoint Security Settings Management| On the roadmap|
115+
| Intune | On the roadmap |
116+
| Configuration Manager Tenant Attach | On the roadmap |
117+
| Configuration Manager Co-Management | Info |
118+
| Group Policy | Go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**, and set Experimentation and Configuration Service (ECS) integration for Defender Core Service to either **Not configured** or **Enabled** (this is the default setting). <br/><br/>The Microsoft Defender Core Service uses ECS to rapidly deliver critical, org-specific fixes for Microsoft Defender Antivirus and other Defender software. <br/><br/>When disabled, the Microsoft Defender Core Service stops using ECS. <br/><br/>For false positives, fixes are delivered via Security Intelligence updates. <br/><br/>For Platform and/or Engine updates, fixes are delivered thru Microsoft Update, Microsoft Update Catalog or WSUS. <br/><br/>When you set telemetry for the Microsoft Defender Core Service to **Not configured** or **Enabled** (this is the default setting), the Microsoft Defender Core Service collects telemetry from Microsoft Defender Antivirus and other Defender software. When disabled, the Microsoft Defender Core Service stops collecting telemetry from Microsoft Defender Antivirus and other Defender software. Disabling this setting can impact Microsoft's ability to quickly recognize and address problems, such as slow performance and false positives.|
119+
| Powershell | `Set-MpPreferences -DisableCoreServiceECSIntegration $true | $false`<br/><br/> `Set-MpPreferences -DisableCoreServiceTelemetry $true | $false` |
120+
| Registry | **HKLM\Software\Policies\Microsoft\Windows Defender\Features DisableCoreService1DSTelemetry** <br/>Set (dword) 0 (hex) 0 = Not Configured, enabled (default) 1 = disabled<br/><br/> `DisableCoreServiceECSIntegration`<br/>Set (dword) 0 (hex) 0 = Not Configured, enabled (default) 1 = disabled|

0 commit comments

Comments
 (0)