Skip to content

Commit 71af62e

Browse files
Merge pull request #3352 from YongRhee-MSFT/docs-editor/mde-security-settings-manageme-1743615967
Update mde-security-settings-management.md
2 parents 03cafc6 + 354b10d commit 71af62e

File tree

1 file changed

+76
-65
lines changed

1 file changed

+76
-65
lines changed

defender-endpoint/mde-security-settings-management.md

Lines changed: 76 additions & 65 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: deniseb
88
ms.service: defender-endpoint
99
ms.subservice: ngp
1010
ms.topic: how-to
11-
ms.date: 02/18/2025
11+
ms.date: 04/02/2025
1212
ms.collection:
1313
- m365-security
1414
- tier2
@@ -35,14 +35,14 @@ ms.custom:
3535
- macOS
3636
- Linux
3737

38-
Use the Microsoft Defender for Endpoint Security Settings Management to manage Microsoft Defender Antivirus security policies on devices.
38+
This article describes how to manage Microsoft Defender Antivirus security policies on devices with Defender for Endpoint Security Settings Management (in the [Microsoft Defender portal](https://security.microsoft.com)).
3939

40-
### Prerequisites:
40+
### Prerequisites
4141

4242
Review the prerequisites [here](/mem/intune/protect/mde-security-integration).
4343

4444
> [!NOTE]
45-
> The **Endpoint Security Policies** page in the Microsoft Defender portal is available only for [users with the Security Administrator role assigned](assign-portal-access.md). Any other user role, such as Security Reader, can't access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in the scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
45+
> The **Endpoint Security Policies** page in the Microsoft Defender portal is available only for [users with the Security Administrator role assigned](assign-portal-access.md). Any other user role, such as Security Reader, can't access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in the scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
4646
4747
As a security administrator, you can configure different Microsoft Defender Antivirus security policy settings in the [Microsoft Defender portal](https://security.microsoft.com).
4848

@@ -67,7 +67,7 @@ The following list provides a brief description of each endpoint security policy
6767

6868
## Create an endpoint security policy
6969

70-
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) using at least a Security Administrator role.
70+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) using an account with at least the Security Administrator role assigned.
7171

7272
2. Select **Endpoints** > **Configuration management** > **Endpoint security policies** and then select **Create new Policy**.
7373

@@ -130,13 +130,14 @@ During an investigation, you can also view the **Security policies** tab in the
130130
|Allow On Access Protection|Allowed|
131131
|PUA Protection|PUA Protection on|
132132

133-
For more information, see:
133+
For more information, see the following articles:
134+
134135
- [Advanced technologies at the core of Microsoft Defender Antivirus](/defender-endpoint/adv-tech-of-mdav)
135136
- [Enable and configure Microsoft Defender Antivirus always-on protection](/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus)
136137
- [Behavior monitoring in Microsoft Defender Antivirus](/defender-endpoint/behavior-monitor)
137138
- [Detect and block potentially unwanted applications](/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus)
138139

139-
1. **Cloud protection features**:
140+
**Cloud protection features**:
140141

141142
|Description|Setting|
142143
|---|---|
@@ -168,19 +169,18 @@ For more information, see [Configure Microsoft Defender Antivirus scanning optio
168169
|Description|Setting|
169170
|---|---|
170171
|Signature Update Interval|Configured, 4|
171-
|Signature Update Fallback Order|InternalDefinitionUpdateServer |
172-
|MicrosoftUpdateServer | MMPC|
172+
|Signature Update Fallback Order| MicrosoftUpdateServer <br/> InternalDefinitionUpdateServer <br/> MMPC|
173173
|Signature Update File Shares Sources | Not configured|
174174
|Metered Connection Updates | Not allowed (default)|
175175
|Security Intelligence Updates Channel | Not configured|
176176

177177
> [!NOTE]
178-
> Where:
179-
> 'InternalDefinitionUpdateServer' is WSUS with Microsoft Defender Antivirus updates allowed.
180-
> 'MicrosoftUpdateServer' is Microsoft Update (formerly Windows Update).
181-
> 'MMPC' is Microsoft Defender security intelligence center (WDSI formerly Microsoft Malware Protection Center) https://www.microsoft.com/en-us/wdsi/definitions.
178+
> `InternalDefinitionUpdateServer` is WSUS with Microsoft Defender Antivirus updates allowed.
179+
> `MicrosoftUpdateServer` is Microsoft Update (formerly Windows Update).
180+
> `MMPC` is Microsoft Defender security intelligence center (WDSI formerly Microsoft Malware Protection Center) https://www.microsoft.com/en-us/wdsi/definitions.
181+
182+
For more information, see the following articles:
182183

183-
For more information, see:
184184
- [Microsoft Defender Antivirus security intelligence and product updates](/defender-endpoint/microsoft-defender-antivirus-updates)
185185
- [Update channels for security intelligence updates](/defender-endpoint/manage-gradual-rollout)
186186

@@ -238,7 +238,8 @@ For more information, see [Manage the gradual rollout process for Microsoft Defe
238238
> In this example, a quick scan runs for Windows clients on Wednesday's at 5:00 PM. (1020).
239239
> And for Windows Servers, on Saturday's at 1:00 AM. (60)
240240
241-
For more information, see:
241+
For more information, see the following articles:
242+
242243
- [Configure scheduled quick or full Microsoft Defender Antivirus scans](/defender-endpoint/schedule-antivirus-scans)
243244
- [Microsoft Defender Antivirus full scan considerations and best practices](/defender-endpoint/mdav-scan-best-practices)
244245

@@ -250,31 +251,26 @@ For more information, see:
250251
|Remediation action for Severe threats|Quarantine|
251252
|Remediation action for Low severity threats|Quarantine|
252253
|Remediation action for Moderate severity threats|Quarantine|
253-
254-
|Description|Setting|
255-
|---|---|
256254
|Days To Retain Cleaned Malware|Configured, 60|
257-
|Allow User UI Access|Allowed. Let users access UI.|
255+
|Allow User UI Access|Allowed. Let users access UI.|
258256

259257
For more information, see [Configure remediation for Microsoft Defender Antivirus detections](/defender-endpoint/configure-remediation-microsoft-defender-antivirus).
260258

261259
**Antivirus exclusions:**
262260

263261
***Local administrator merge behavior***:
264262

265-
Disable local administrator AV settings such as exclusions, and set the policies from the Microsoft Defender for Endpoint Security Settings Management as described in the following table:
263+
Disable local administrator antivirus settings, such as exclusions, and set the policies using Defender for Endpoint Security Settings Management, as described in the following table:
266264

267265
|Description|Setting|
268266
|---|---|
269267
|Disable Local Admin Merge|Disable Local Admin Merge|
270-
271-
|Description|Setting|
272-
|---|---|
273268
|Excluded Extensions | Add as needed for working around false positives (FPs) and/or troubleshooting high cpu utilizations in MsMpEng.exe |
274269
|Excluded Paths | Add as needed for working around false positives (FPs) and/or troubleshooting high cpu utilizations in MsMpEng.exe |
275270
|Excluded Processes | Add as needed for working around false positives (FPs) and/or troubleshooting high cpu utilizations in MsMpEng.exe|
276271

277-
For more information, see:
272+
For more information, see the following articles:
273+
278274
- [Prevent or allow users to locally modify Microsoft Defender Antivirus policy settings](/defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus)
279275
- [Configure custom exclusions for Microsoft Defender Antivirus](/defender-endpoint/configure-exclusions-microsoft-defender-antivirus)
280276

@@ -303,22 +299,32 @@ For more information, see [Microsoft Defender Core service overview](/defender-e
303299
For more information, see [Use network protection to help prevent connections to malicious or suspicious sites](/defender-endpoint/network-protection).
304300

305301
1. When you're done configuring settings, select **Next**.
302+
306303
2. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
304+
307305
3. Select **Next**.
306+
308307
4. On the **Review + create** tab, review your policy settings, and then select **Save**.
309308

310309
### Attack Surface Reduction rules
311310

312311
To enable Attack Surface Reduction (ASR) rules using the endpoint security policies, perform the following steps:
313312

314313
1. Sign in to [Microsoft Defender XDR](https://sip.security.microsoft.com/).
315-
1. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
316-
1. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
317-
1. Select **Attack Surface Reduction Rules** from the **Select Template** drop-down list.
318-
1. Select **Create policy**.
319-
1. On the **Basics** page, enter a name and description for the profile; then, choose **Next**.
320-
1. On the **Configuration settings** page, expand the groups of settings and configure the settings that you want to manage with this profile.
321-
1. Set the policies based on the following recommended settings:
314+
315+
2. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
316+
317+
3. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
318+
319+
4. Select **Attack Surface Reduction Rules** from the **Select Template** drop-down list.
320+
321+
5. Select **Create policy**.
322+
323+
6. On the **Basics** page, enter a name and description for the profile; then, choose **Next**.
324+
325+
7. On the **Configuration settings** page, expand the groups of settings and configure the settings that you want to manage with this profile.
326+
327+
8. Set the policies based on the following recommended settings:
322328

323329
|Description|Setting|
324330
|---|---|
@@ -343,41 +349,53 @@ To enable Attack Surface Reduction (ASR) rules using the endpoint security polic
343349
|[PREVIEW] Block rebooting machine in Safe Mode|Block|
344350
|Enable Controlled Folder Access|Enabled|
345351

346-
> [!TIP]
347-
> Any of the rules might block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named "Attack Surface Reduction Only Exclusions." Additionally, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
352+
> [!TIP]
353+
> Any of the rules might block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named "Attack Surface Reduction Only Exclusions." Additionally, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
354+
355+
For more information, see [Attack surface reduction rules deployment overview](/defender-endpoint/attack-surface-reduction-rules-deployment).
348356

349-
For more information, see [Attack surface reduction rules deployment overview](/defender-endpoint/attack-surface-reduction-rules-deployment).
357+
9. Select **Next**.
350358

351-
1. Select **Next**.
352-
1. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
353-
1. Select **Next**.
354-
1. On the **Review + create** tab, review your policy settings, and then select **Save**.
359+
10. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
360+
361+
11. Select **Next**.
362+
363+
12. On the **Review + create** tab, review your policy settings, and then select **Save**.
355364

356365

357366
#### Enable Tamper Protection
358367

359368
1. Sign in to [Microsoft Defender XDR](https://sip.security.microsoft.com/).
360-
1. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
361-
1. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
362-
1. Select **Security Experience** from the **Select Template** drop-down list.
363-
1. Select **Create policy**. The **Create a new policy** page appears.
364-
1. On the **Basics** page, enter a name and description for the profile in the **Name** and **Description** fields, respectively.
365-
1. Select **Next**.
366-
1. On the **Configuration settings** page, expand the groups of settings.
367-
1. From these groups, select the settings that you want to manage with this profile.
368-
1. Set the policies for the chosen groups of settings by configuring them as described in the following table:
369+
370+
2. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
371+
372+
3. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
373+
374+
4. Select **Security Experience** from the **Select Template** drop-down list.
375+
376+
5. Select **Create policy**. The **Create a new policy** page appears.
377+
378+
6. On the **Basics** page, enter a name and description for the profile in the **Name** and **Description** fields, respectively.
379+
380+
7. Select **Next**.
381+
382+
8. On the **Configuration settings** page, expand the groups of settings.
383+
384+
9. From these groups, select the settings that you want to manage with this profile.
385+
386+
10. Set the policies for the chosen groups of settings by configuring them as described in the following table:
369387

370388
|Description| Setting|
371389
| -------- | -------- |
372390
| TamperProtection (Device) | On|
373391

374-
For more information, see [Protect security settings with tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
392+
For more information, see [Protect security settings with tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
375393

376394
#### Check the Cloud Protection network connectivity
377395

378396
It's important to check that the Cloud Protection network connectivity is working during your penetration testing.
379397

380-
CMD (Run as admin)
398+
Open Command Prompt as an administrator, and then run the following command:
381399

382400
```powershell
383401
cd "C:\Program Files\Windows Defender"
@@ -388,29 +406,29 @@ For more information, see [Use the cmdline tool to validate cloud-delivered prot
388406

389407
#### Check the platform update version
390408

391-
The latest "Platform Update" version Production channel (GA) is available in [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623+update).
409+
The latest Platform Update version Production channel (GA) is available in [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623+update).
392410

393-
To check which "Platform Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
411+
To check which Platform Update version you have installed, run the following command in PowerShell using the privileges of an administrator:
394412

395413
```powershell
396414
Get-MPComputerStatus | Format-Table AMProductVersion
397415
```
398416

399417
#### Check the Security Intelligence Update version
400418

401-
The latest "Security Intelligence Update" version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
419+
The latest Security Intelligence Update version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
402420

403-
To check which "Security Intelligence Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
421+
To check which Security Intelligence Update version you have installed, run the following command in PowerShell using the privileges of an administrator:
404422

405423
```powershell
406424
Get-MPComputerStatus | Format-Table AntivirusSignatureVersion
407425
```
408426

409427
#### Check the Engine Update version
410428

411-
The latest scan "engine update" version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
429+
The latest scan engine update version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
412430

413-
To check which "Engine Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
431+
To check which Engine Update version you have installed, run the following command in PowerShell as an administrator:
414432

415433
```powershell
416434
Get-MPComputerStatus | Format-Table AMEngineVersion
@@ -420,27 +438,20 @@ If you find that your settings aren't taking effect, you might have a conflict.
420438

421439
#### For False Negatives (FNs) submissions
422440

423-
To information on how to make False Negatives (FNs) submissions, see:
441+
To report False Negatives (FNs), see the following articles:
424442

425443
- [Submit files in Microsoft Defender for Endpoint](admin-submissions-mde.md) if you have Microsoft XDR, Microsoft Defender for Endpoint P2/P1, or Microsoft Defender for Business.
426444
- [Submit files for analysis](/unified-secops-platform/submission-guide) if you have Microsoft Defender Antivirus.
445+
427446
## **See also**
428447

429448
- [Troubleshoot Microsoft Defender Antivirus settings](/defender-endpoint/troubleshoot-settings)
430-
431449
- [Troubleshoot Microsoft Defender Antivirus Security intelligence not getting updated](/defender-endpoint/troubleshoot-security-intelligence-not-updated)
432-
433450
- [Troubleshooting Security Intelligence Updates from Microsoft Update source](/defender-endpoint/security-intelligence-update-tshoot)
434-
435451
- [Troubleshoot attack surface reduction rules](/defender-endpoint/troubleshoot-asr)
436-
437452
- [Troubleshoot network protection](/defender-endpoint/troubleshoot-np)
438-
439453
- [Troubleshoot problems with tamper protection](/defender-endpoint/troubleshoot-problems-with-tamper-protection)
440-
441454
- [Troubleshoot performance issues related to real-time protection](/defender-endpoint/troubleshoot-performance-issues)
442-
443455
- [Run the client analyzer on Windows](/defender-endpoint/run-analyzer-windows)
444-
445456
- [Performance analyzer for Microsoft Defender Antivirus](/defender-endpoint/tune-performance-defender-antivirus)
446-
457+

0 commit comments

Comments
 (0)