Skip to content

Commit 70040c3

Browse files
committed
Update deployment-vdi-microsoft-defender-antivirus.md
1 parent 825abe1 commit 70040c3

File tree

1 file changed

+18
-18
lines changed

1 file changed

+18
-18
lines changed

defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -295,45 +295,45 @@ It's important to take advantage of the included threat protection capabilities
295295

296296
### Threats
297297

298-
Specify threat alert levels at which default action should not be taken when detected: Enabled. Set Severe (5), High (4), Medium (2) and Low (1), all to quarantine (2)
298+
- Specify threat alert levels at which default action should not be taken when detected: `Enabled`
299299

300-
|Value name|Value |
301-
| -------- | -------- |
302-
|1 |2 |
303-
|2|2|
304-
|4|2|
305-
|5|2|
300+
- Set `Severe (5)`, `High (4)`, `Medium (2)`, and `Low (1)` all to `Quarantine (2)`, as shown in the following table:
306301

307-
### Attack surface reduction rules
308-
309-
Configure all available rules to Audit.
302+
|Value name|Value |
303+
| -------- | -------- |
304+
|`1` (Low) |`2` |
305+
|`2` (Medium) |`2`|
306+
|`4` (High) |`2`|
307+
|`5` (Severe) |`2`|
310308

309+
### Attack surface reduction rules
311310

311+
Configure all available rules to `Audit`.
312312

313313
### Enable network protection
314314

315-
Prevent users and apps from accessing dangerous websites (Enable network protection): Enabled - Audit mode
315+
Prevent users and apps from accessing dangerous websites (Enable network protection): `Enabled - Audit mode`
316316

317317
### SmartScreen for Microsoft Edge
318318

319-
Require SmartScreen for Microsoft Edge: Yes
319+
- Require SmartScreen for Microsoft Edge: `Yes`
320320

321-
Block malicious site access: Yes
321+
- Block malicious site access: `Yes`
322322

323-
Block unverified file download: Yes
323+
- Block unverified file download: `Yes`
324324

325325
## Run the "Windows Defender Cache Maintenance" scheduled task
326326

327327
Optimize the "Windows Defender Cache Maintenance" scheduled task for non-persistent and/or persistent VDI environments. Run this task on the main image before sealing.
328328

329329
1. Open up the **Task Scheduler** mmc (`taskschd.msc`).
330330

331-
1. Expand **Task Scheduler Library** > **Microsoft** > **Windows** > **Windows Defender**, and then right-click on **Windows Defender Cache Maintenance**.
331+
2. Expand **Task Scheduler Library** > **Microsoft** > **Windows** > **Windows Defender**, and then right-click on **Windows Defender Cache Maintenance**.
332332

333-
1. Select **Run**, and let the scheduled task finish.
333+
3. Select **Run**, and let the scheduled task finish.
334334

335-
1. > [!WARNING]
336-
> If you do not do this, it can cause higher cpu utilization while the cache maintenance task is running on each of the VMs.
335+
> [!WARNING]
336+
> If you do not do this, it can cause higher cpu utilization while the cache maintenance task is running on each of the VMs.
337337
338338
### Enable Tamper protection
339339

0 commit comments

Comments
 (0)