You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/mde-security-settings-management.md
+76-65Lines changed: 76 additions & 65 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: deniseb
8
8
ms.service: defender-endpoint
9
9
ms.subservice: ngp
10
10
ms.topic: how-to
11
-
ms.date: 02/18/2025
11
+
ms.date: 04/02/2025
12
12
ms.collection:
13
13
- m365-security
14
14
- tier2
@@ -35,14 +35,14 @@ ms.custom:
35
35
- macOS
36
36
- Linux
37
37
38
-
Use the Microsoft Defender for Endpoint Security Settings Management to manage Microsoft Defender Antivirus security policies on devices.
38
+
This article describes how to manage Microsoft Defender Antivirus security policies on devices with Defender for Endpoint Security Settings Management (in the [Microsoft Defender portal](https://security.microsoft.com)).
39
39
40
-
### Prerequisites:
40
+
### Prerequisites
41
41
42
42
Review the prerequisites [here](/mem/intune/protect/mde-security-integration).
43
43
44
44
> [!NOTE]
45
-
> The **Endpoint Security Policies** page in the Microsoft Defender portal is available only for [users with the Security Administrator role assigned](assign-portal-access.md). Any other user role, such as Security Reader, can't access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in the scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
45
+
> The **Endpoint Security Policies** page in the Microsoft Defender portal is available only for [users with the Security Administrator role assigned](assign-portal-access.md). Any other user role, such as Security Reader, can't access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in the scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
46
46
47
47
As a security administrator, you can configure different Microsoft Defender Antivirus security policy settings in the [Microsoft Defender portal](https://security.microsoft.com).
48
48
@@ -67,7 +67,7 @@ The following list provides a brief description of each endpoint security policy
67
67
68
68
## Create an endpoint security policy
69
69
70
-
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) using at least a Security Administrator role.
70
+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) using an account with at least the Security Administrator role assigned.
71
71
72
72
2. Select **Endpoints** > **Configuration management** > **Endpoint security policies** and then select **Create new Policy**.
73
73
@@ -130,13 +130,14 @@ During an investigation, you can also view the **Security policies** tab in the
130
130
|Allow On Access Protection|Allowed|
131
131
|PUA Protection|PUA Protection on|
132
132
133
-
For more information, see:
133
+
For more information, see the following articles:
134
+
134
135
-[Advanced technologies at the core of Microsoft Defender Antivirus](/defender-endpoint/adv-tech-of-mdav)
135
136
-[Enable and configure Microsoft Defender Antivirus always-on protection](/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus)
136
137
-[Behavior monitoring in Microsoft Defender Antivirus](/defender-endpoint/behavior-monitor)
137
138
-[Detect and block potentially unwanted applications](/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus)
138
139
139
-
1.**Cloud protection features**:
140
+
**Cloud protection features**:
140
141
141
142
|Description|Setting|
142
143
|---|---|
@@ -168,19 +169,18 @@ For more information, see [Configure Microsoft Defender Antivirus scanning optio
|Signature Update File Shares Sources | Not configured|
174
174
|Metered Connection Updates | Not allowed (default)|
175
175
|Security Intelligence Updates Channel | Not configured|
176
176
177
177
> [!NOTE]
178
-
> Where:
179
-
> 'InternalDefinitionUpdateServer' is WSUS with Microsoft Defender Antivirus updates allowed.
180
-
> 'MicrosoftUpdateServer' is Microsoft Update (formerly Windows Update).
181
-
> 'MMPC' is Microsoft Defender security intelligence center (WDSI formerly Microsoft Malware Protection Center) https://www.microsoft.com/en-us/wdsi/definitions.
178
+
> `InternalDefinitionUpdateServer` is WSUS with Microsoft Defender Antivirus updates allowed.
179
+
> `MicrosoftUpdateServer` is Microsoft Update (formerly Windows Update).
180
+
> `MMPC` is Microsoft Defender security intelligence center (WDSI formerly Microsoft Malware Protection Center) https://www.microsoft.com/en-us/wdsi/definitions.
181
+
182
+
For more information, see the following articles:
182
183
183
-
For more information, see:
184
184
-[Microsoft Defender Antivirus security intelligence and product updates](/defender-endpoint/microsoft-defender-antivirus-updates)
185
185
-[Update channels for security intelligence updates](/defender-endpoint/manage-gradual-rollout)
186
186
@@ -238,7 +238,8 @@ For more information, see [Manage the gradual rollout process for Microsoft Defe
238
238
> In this example, a quick scan runs for Windows clients on Wednesday's at 5:00 PM. (1020).
239
239
> And for Windows Servers, on Saturday's at 1:00 AM. (60)
240
240
241
-
For more information, see:
241
+
For more information, see the following articles:
242
+
242
243
-[Configure scheduled quick or full Microsoft Defender Antivirus scans](/defender-endpoint/schedule-antivirus-scans)
243
244
-[Microsoft Defender Antivirus full scan considerations and best practices](/defender-endpoint/mdav-scan-best-practices)
244
245
@@ -250,31 +251,26 @@ For more information, see:
250
251
|Remediation action for Severe threats|Quarantine|
251
252
|Remediation action for Low severity threats|Quarantine|
252
253
|Remediation action for Moderate severity threats|Quarantine|
253
-
254
-
|Description|Setting|
255
-
|---|---|
256
254
|Days To Retain Cleaned Malware|Configured, 60|
257
-
|Allow User UI Access|Allowed. Let users access UI.|
255
+
|Allow User UI Access|Allowed. Let users access UI.|
258
256
259
257
For more information, see [Configure remediation for Microsoft Defender Antivirus detections](/defender-endpoint/configure-remediation-microsoft-defender-antivirus).
260
258
261
259
**Antivirus exclusions:**
262
260
263
261
***Local administrator merge behavior***:
264
262
265
-
Disable local administrator AV settings such as exclusions, and set the policies from the Microsoft Defender for Endpoint Security Settings Management as described in the following table:
263
+
Disable local administrator antivirus settings, such as exclusions, and set the policies using Defender for Endpoint Security Settings Management, as described in the following table:
266
264
267
265
|Description|Setting|
268
266
|---|---|
269
267
|Disable Local Admin Merge|Disable Local Admin Merge|
270
-
271
-
|Description|Setting|
272
-
|---|---|
273
268
|Excluded Extensions | Add as needed for working around false positives (FPs) and/or troubleshooting high cpu utilizations in MsMpEng.exe |
274
269
|Excluded Paths | Add as needed for working around false positives (FPs) and/or troubleshooting high cpu utilizations in MsMpEng.exe |
275
270
|Excluded Processes | Add as needed for working around false positives (FPs) and/or troubleshooting high cpu utilizations in MsMpEng.exe|
276
271
277
-
For more information, see:
272
+
For more information, see the following articles:
273
+
278
274
-[Prevent or allow users to locally modify Microsoft Defender Antivirus policy settings](/defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus)
279
275
-[Configure custom exclusions for Microsoft Defender Antivirus](/defender-endpoint/configure-exclusions-microsoft-defender-antivirus)
280
276
@@ -303,22 +299,32 @@ For more information, see [Microsoft Defender Core service overview](/defender-e
303
299
For more information, see [Use network protection to help prevent connections to malicious or suspicious sites](/defender-endpoint/network-protection).
304
300
305
301
1. When you're done configuring settings, select **Next**.
302
+
306
303
2. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
304
+
307
305
3. Select **Next**.
306
+
308
307
4. On the **Review + create** tab, review your policy settings, and then select **Save**.
309
308
310
309
### Attack Surface Reduction rules
311
310
312
311
To enable Attack Surface Reduction (ASR) rules using the endpoint security policies, perform the following steps:
313
312
314
313
1. Sign in to [Microsoft Defender XDR](https://sip.security.microsoft.com/).
315
-
1. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
316
-
1. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
317
-
1. Select **Attack Surface Reduction Rules** from the **Select Template** drop-down list.
318
-
1. Select **Create policy**.
319
-
1. On the **Basics** page, enter a name and description for the profile; then, choose **Next**.
320
-
1. On the **Configuration settings** page, expand the groups of settings and configure the settings that you want to manage with this profile.
321
-
1. Set the policies based on the following recommended settings:
314
+
315
+
2. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
316
+
317
+
3. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
318
+
319
+
4. Select **Attack Surface Reduction Rules** from the **Select Template** drop-down list.
320
+
321
+
5. Select **Create policy**.
322
+
323
+
6. On the **Basics** page, enter a name and description for the profile; then, choose **Next**.
324
+
325
+
7. On the **Configuration settings** page, expand the groups of settings and configure the settings that you want to manage with this profile.
326
+
327
+
8. Set the policies based on the following recommended settings:
322
328
323
329
|Description|Setting|
324
330
|---|---|
@@ -343,41 +349,53 @@ To enable Attack Surface Reduction (ASR) rules using the endpoint security polic
343
349
|[PREVIEW] Block rebooting machine in Safe Mode|Block|
344
350
|Enable Controlled Folder Access|Enabled|
345
351
346
-
> [!TIP]
347
-
> Any of the rules might block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named "Attack Surface Reduction Only Exclusions." Additionally, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
352
+
> [!TIP]
353
+
> Any of the rules might block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named "Attack Surface Reduction Only Exclusions." Additionally, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
354
+
355
+
For more information, see [Attack surface reduction rules deployment overview](/defender-endpoint/attack-surface-reduction-rules-deployment).
348
356
349
-
For more information, see [Attack surface reduction rules deployment overview](/defender-endpoint/attack-surface-reduction-rules-deployment).
357
+
9. Select **Next**.
350
358
351
-
1. Select **Next**.
352
-
1. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
353
-
1. Select **Next**.
354
-
1. On the **Review + create** tab, review your policy settings, and then select **Save**.
359
+
10. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
360
+
361
+
11. Select **Next**.
362
+
363
+
12. On the **Review + create** tab, review your policy settings, and then select **Save**.
355
364
356
365
357
366
#### Enable Tamper Protection
358
367
359
368
1. Sign in to [Microsoft Defender XDR](https://sip.security.microsoft.com/).
360
-
1. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
361
-
1. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
362
-
1. Select **Security Experience** from the **Select Template** drop-down list.
363
-
1. Select **Create policy**. The **Create a new policy** page appears.
364
-
1. On the **Basics** page, enter a name and description for the profile in the **Name** and **Description** fields, respectively.
365
-
1. Select **Next**.
366
-
1. On the **Configuration settings** page, expand the groups of settings.
367
-
1. From these groups, select the settings that you want to manage with this profile.
368
-
1. Set the policies for the chosen groups of settings by configuring them as described in the following table:
369
+
370
+
2. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
371
+
372
+
3. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
373
+
374
+
4. Select **Security Experience** from the **Select Template** drop-down list.
375
+
376
+
5. Select **Create policy**. The **Create a new policy** page appears.
377
+
378
+
6. On the **Basics** page, enter a name and description for the profile in the **Name** and **Description** fields, respectively.
379
+
380
+
7. Select **Next**.
381
+
382
+
8. On the **Configuration settings** page, expand the groups of settings.
383
+
384
+
9. From these groups, select the settings that you want to manage with this profile.
385
+
386
+
10. Set the policies for the chosen groups of settings by configuring them as described in the following table:
369
387
370
388
|Description| Setting|
371
389
| -------- | -------- |
372
390
| TamperProtection (Device) | On|
373
391
374
-
For more information, see [Protect security settings with tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
392
+
For more information, see [Protect security settings with tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
375
393
376
394
#### Check the Cloud Protection network connectivity
377
395
378
396
It's important to check that the Cloud Protection network connectivity is working during your penetration testing.
379
397
380
-
CMD (Run as admin)
398
+
Open Command Prompt as an administrator, and then run the following command:
381
399
382
400
```powershell
383
401
cd "C:\Program Files\Windows Defender"
@@ -388,29 +406,29 @@ For more information, see [Use the cmdline tool to validate cloud-delivered prot
388
406
389
407
#### Check the platform update version
390
408
391
-
The latest "Platform Update" version Production channel (GA) is available in [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623+update).
409
+
The latest Platform Update version Production channel (GA) is available in [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623+update).
392
410
393
-
To check which "Platform Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
411
+
To check which Platform Update version you have installed, run the following command in PowerShell using the privileges of an administrator:
#### Check the Security Intelligence Update version
400
418
401
-
The latest "Security Intelligence Update" version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
419
+
The latest Security Intelligence Update version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
402
420
403
-
To check which "Security Intelligence Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
421
+
To check which Security Intelligence Update version you have installed, run the following command in PowerShell using the privileges of an administrator:
The latest scan "engine update" version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
429
+
The latest scan engine update version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
412
430
413
-
To check which "Engine Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
431
+
To check which Engine Update version you have installed, run the following command in PowerShell as an administrator:
@@ -420,27 +438,20 @@ If you find that your settings aren't taking effect, you might have a conflict.
420
438
421
439
#### For False Negatives (FNs) submissions
422
440
423
-
To information on how to make False Negatives (FNs) submissions, see:
441
+
To report False Negatives (FNs), see the following articles:
424
442
425
443
-[Submit files in Microsoft Defender for Endpoint](admin-submissions-mde.md) if you have Microsoft XDR, Microsoft Defender for Endpoint P2/P1, or Microsoft Defender for Business.
426
444
-[Submit files for analysis](/unified-secops-platform/submission-guide) if you have Microsoft Defender Antivirus.
445
+
427
446
## **See also**
428
447
429
448
-[Troubleshoot Microsoft Defender Antivirus settings](/defender-endpoint/troubleshoot-settings)
430
-
431
449
-[Troubleshoot Microsoft Defender Antivirus Security intelligence not getting updated](/defender-endpoint/troubleshoot-security-intelligence-not-updated)
432
-
433
450
-[Troubleshooting Security Intelligence Updates from Microsoft Update source](/defender-endpoint/security-intelligence-update-tshoot)
0 commit comments