Skip to content

Commit 75b48c5

Browse files
authored
Merge pull request #2715 from YongRhee-MSFT/docs-editor/microsoft-defender-antivirus-u-1739263081
Update microsoft-defender-antivirus-using-powershell.md -- Emm is reviewing
2 parents 21925e6 + 66ad826 commit 75b48c5

File tree

1 file changed

+33
-14
lines changed

1 file changed

+33
-14
lines changed

defender-endpoint/microsoft-defender-antivirus-using-powershell.md

Lines changed: 33 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection:
1818
search.appverid: met150
1919
---
2020

21-
# Evaluate Microsoft Defender Antivirus using Powershell
21+
# Evaluate Microsoft Defender Antivirus using PowerShell
2222

2323
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2424

@@ -30,11 +30,11 @@ search.appverid: met150
3030

3131
In Windows 10 or newer and Windows Server 2016 or newer you can use next-generation protection features offered by Microsoft Defender Antivirus(MDAV) and Microsoft Defender Exploit Guard (Microsoft Defender EG).
3232

33-
This topic explains how to enable and test the key protection features in Microsoft Defender AV and Microsoft Defender EG, and provides you with guidance and links to more information.
33+
This article explains how to enable and test the key protection features in Microsoft Defender AV and Microsoft Defender EG, and provides you with guidance and links to more information.
3434

3535
We recommend you use [this evaluation PowerShell script](https://aka.ms/wdeppscript) to configure these features, but you can individually enable each feature with the cmdlets described in the rest of this document.
3636

37-
See the following product documentation libraries for more information about our EPP products:
37+
For more information about our EPP products, see the following product documentation libraries:
3838

3939
- [Microsoft Defender Antivirus](https://aka.ms/wdavdocs)
4040
- [Microsoft Defender Exploit Guard](https://aka.ms/wdegdocs)
@@ -49,9 +49,8 @@ This guide provides the [Microsoft Defender Antivirus cmdlets](/powershell/modul
4949

5050
To use these cmdlets:
5151

52-
> 1\. Open an elevated instance of PowerShell (choose to Run as administrator).
53-
>
54-
> 2\. Enter the command listed in this guide and press Enter.
52+
1. Open an elevated instance of PowerShell (choose to Run as administrator).
53+
1. Enter the command listed in this guide and press **Enter**.
5554

5655
You can check the status of all settings before you begin, or during your evaluation, by using the [Get-MpPreference PowerShell cmdlet](/powershell/module/defender/get-mppreference?view=windowsserver2022-ps&preserve-view=true).
5756

@@ -72,32 +71,32 @@ More details are available in [Use next-gen technologies in Microsoft Defender A
7271
|Always Use the cloud to block new malware within seconds|Set-MpPreference -DisableBlockAtFirstSeen 0|
7372
|Scan all downloaded files and attachments|Set-MpPreference -DisableIOAVProtection 0|
7473
|Set cloud block level to 'High'|Set-MpPreference -CloudBlockLevel High|
75-
|High Set cloud block timeout to 1 minute|Set-MpPreference -CloudExtendedTimeout 50|
74+
|High Set cloud block time-out to 1 minute|Set-MpPreference -CloudExtendedTimeout 50|
7675

7776
## Always-on protection (real-time scanning)
7877

7978
Microsoft Defender AV scans files as soon as they're seen by Windows, and will monitor running processes for known or suspected malicious behaviors. If the antivirus engine discovers malicious modification, it will immediately block the process or file from running.
8079

81-
See [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md) for more details on these options.
80+
For more details on these options, see [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md).
8281

8382
| Description | PowerShell Command |
8483
|---|---|
8584
|Constantly monitor files and processes for known malware modifications | Set-MpPreference -DisableRealtimeMonitoring 0 |
8685
|Constantly monitor for known malware behaviors – even in 'clean' files and running programs | Set-MpPreference -DisableBehaviorMonitoring 0 |
87-
|Scan scripts as soon as they are seen or run | Set-MpPreference -DisableScriptScanning 0 |
88-
|Scan removable drives as soon as they are inserted or mounted | Set-MpPreference -DisableRemovableDriveScanning 0 |
86+
|Scan scripts as soon as they're seen or run | Set-MpPreference -DisableScriptScanning 0 |
87+
|Scan removable drives as soon as they're inserted or mounted | Set-MpPreference -DisableRemovableDriveScanning 0 |
8988

9089
## Potentially Unwanted Application protection
9190

92-
[Potentially unwanted applications](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) are files and apps that are not traditionally classified as malicious. These include third-party installers for common software, ad-injection, and certain types of toolbars in your browser.
91+
[Potentially unwanted applications](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) are files and apps that aren't traditionally classified as malicious. These include non-Microsoft installers for common software, ad-injection, and certain types of toolbars in your browser.
9392

9493
| Description | PowerShell Command |
9594
|---|---|
9695
|Prevent grayware, adware, and other potentially unwanted apps from installing|Set-MpPreference -PUAProtection Enabled|
9796

9897
## Email and archive scanning
9998

100-
You can set Microsoft Defender Antivirus to automatically scan certain types of email files and archive files (such as .zip files) when they are seen by Windows. More information about this feature can be found under the [Manage email scans in Microsoft Defender](configure-advanced-scan-types-microsoft-defender-antivirus.md) article.
99+
You can set Microsoft Defender Antivirus to automatically scan certain types of email files and archive files (such as .zip files) when they're seen by Windows. More information about this feature can be found under the [Managed email scans in Microsoft Defender](configure-advanced-scan-types-microsoft-defender-antivirus.md) article.
101100

102101

103102
| Description | PowerShell Command |
@@ -124,9 +123,29 @@ Microsoft Defender Exploit Guard provides features that help protect devices fro
124123
|Apply a standard set of mitigations with [Exploit protection](exploit-protection.md)|Invoke-WebRequest </br> https://demo.wd.microsoft.com/Content/ProcessMitigation.xml -OutFile ProcessMitigation.xml </br >Set-ProcessMitigation -PolicyFilePath ProcessMitigation.xml|
125124
|Block known malicious attack vectors with [Attack surface reduction](attack-surface-reduction.md)|Add-MpPreference -AttackSurfaceReductionRules\_Ids 56a863a9-875e-4185-98a7-b882c64b5ce5 -AttackSurfaceReductionRules\_Actions Enabled </br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids D4F940AB-401B-4EfC-AADCAD5F3C50688A -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids BE9BA2D9-53EA-4CDC-84E5- 9B1EEEE46550 -AttackSurfaceReductionRules\_Actions Enabled </br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 01443614-CD74-433A-B99E2ECDC07BFC25 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 5BEB7EFE-FD9A-4556801D275E5FFC04CC -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids D3E037E1-3EB8-44C8-A917- 57927947596D -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 3B576869-A4EC-4529-8536- B80A7769E899 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 75668C1F-73B5-4CF0-BB93- 3ECF5CB7CC84 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 26190899-1602-49e8-8b27-eb1d0a1ce869 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids e6db77e5-3df2-4cf1-b95a-636979351e5b -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids D1E49AAC-8F56-4280-B9BA993A6D77406C -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 33ddedf1-c6e0-47cb-833e-de6133960387 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids B2B3F03D-6A65-4F7B-A9C7- 1C7EF74A9BA4 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids a8f5898e-1dc8-49a9-9878-85004b8a61e6 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 92E97FA1-2EDF-4476-BDD6- 9DD0B4DDDC7B -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids C1DB55AB-C21A-4637-BB3FA12568109D35 -AttackSurfaceReductionRules\_Actions Enabled|
126125

127-
Some rules may block behavior you find acceptable in your organization. In these cases, change the rule from Enabled to Audit to prevent unwanted blocks.
126+
Some rules might block behavior you find acceptable in your organization. In these cases, change the rule from Enabled to Audit to prevent unwanted blocks.
128127

129-
## One-click Microsoft Defender Offline Scan
128+
#### Enable Tamper Protection
129+
130+
In the Microsoft XDR portal (security.microsoft.com), go to **Settings** > **Endpoints** > **Advanced features** > **Tamper Protection** > **On**.
131+
132+
For more information, see [How do I configure or manage tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
133+
134+
#### Check the Cloud Protection network connectivity
135+
136+
It's important to check that the Cloud Protection network connectivity is working during your pen testing.
137+
138+
CMD (Run as admin)
139+
140+
141+
```
142+
cd "C:\Program Files\Windows Defender"
143+
MpCmdRun.exe -ValidateMapsConnection
144+
```
145+
146+
For more information, see [Use the cmdline tool to validate cloud-delivered protection](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus).
147+
148+
## One-select Microsoft Defender Offline Scan
130149

131150
Microsoft Defender Offline Scan is a specialized tool that comes with Windows 10 or newer, and allows you to boot a machine into a dedicated environment outside of the normal operating system. It's especially useful for potent malware, such as rootkits.
132151

0 commit comments

Comments
 (0)