Skip to content

Commit 6428b2a

Browse files
committed
Update deployment-vdi-microsoft-defender-antivirus.md
1 parent 661b844 commit 6428b2a

File tree

1 file changed

+6
-9
lines changed

1 file changed

+6
-9
lines changed

defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -38,12 +38,9 @@ You can use Microsoft Defender Antivirus in a remote desktop (RDS) or non-persis
3838
This guide describes how to configure Microsoft Defender Antivirus on your VMs for optimal protection and performance, including how to:
3939

4040
- [Set up a dedicated VDI file share for security intelligence updates](#set-up-a-dedicated-vdi-file-share-for-security-intelligence)
41-
- [Randomize scheduled scans](#randomize-scheduled-scans)
42-
- [Use quick scans](#use-quick-scans)
43-
- [Prevent notifications](#prevent-notifications)
44-
- [Disable scans from occurring after every update](#disable-scans-after-an-update)
45-
- [Scan out-of-date machines or machines that were offline for a while](#scan-vms-that-have-been-offline)
46-
- [Apply exclusions](#exclusions)
41+
- [Download and unpackage the latest updates](#download-and-unpackage-the-latest-updates)
42+
- [Configure Microsoft Defender Antivirus settings](#microsoft-defender-antivirus-configuration-settings)
43+
-
4744

4845
> [!IMPORTANT]
4946
> Although a VDI can be hosted on Windows Server 2012 or Windows Server 2016, virtual machines (VMs) should be running Windows 10, version 1607 at a minimum, due to increased protection technologies and features that are unavailable in earlier versions of Windows.
@@ -312,7 +309,7 @@ Configure all available rules to `Audit`.
312309

313310
### Enable network protection
314311

315-
Prevent users and apps from accessing dangerous websites (Enable network protection): `Enabled - Audit mode`
312+
Prevent users and apps from accessing dangerous websites (Enable network protection): `Enabled - Audit mode`.
316313

317314
### SmartScreen for Microsoft Edge
318315

@@ -322,7 +319,7 @@ Prevent users and apps from accessing dangerous websites (Enable network protect
322319

323320
- Block unverified file download: `Yes`
324321

325-
## Run the "Windows Defender Cache Maintenance" scheduled task
322+
## Run the Windows Defender Cache Maintenance scheduled task
326323

327324
Optimize the "Windows Defender Cache Maintenance" scheduled task for non-persistent and/or persistent VDI environments. Run this task on the main image before sealing.
328325

@@ -343,7 +340,7 @@ Enable tamper protection to prevent Microsoft Defender Antivirus from being disa
343340

344341
If you think you need to add exclusions, see [Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
345342

346-
## EDR
343+
## Next step
347344

348345
If you're also deploying [endpoint detection and response](overview-endpoint-detection-response.md) (EDR) to your Windows-based VDI VMs, see [Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR](/defender-endpoint/configure-endpoints-vdi).
349346

0 commit comments

Comments
 (0)