Skip to content

Commit 7d83386

Browse files
committed
Update microsoft-defender-antivirus-using-powershell.md
1 parent f22dbfc commit 7d83386

File tree

1 file changed

+10
-12
lines changed

1 file changed

+10
-12
lines changed

defender-endpoint/microsoft-defender-antivirus-using-powershell.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -27,22 +27,20 @@ search.appverid: met150
2727
- Microsoft Defender Antivirus
2828
- [Microsoft Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md)
2929

30-
In Windows 10 (or newer) and Windows Server 2016 (or newer), you can use next-generation protection features offered by Microsoft Defender Antivirus and exploit protection.
30+
In Windows 10 (or newer) and Windows Server 2016 (or newer), you can use next-generation protection features offered by Microsoft Defender Antivirus with exploit protection.
3131

32-
This article explains how to enable and test the key protection features in Microsoft Defender Antivirus and exploit protection, and provides you with guidance and links to more information.
32+
This article explains how to enable and test the key protection features in Microsoft Defender Antivirus with exploit protection, and provides you with guidance and links to more information.
3333

34-
We recommend you use [this evaluation PowerShell script](https://aka.ms/wdeppscript) to configure these features, but you can individually enable each feature with the cmdlets described in the rest of this document.
34+
We recommend you use our [evaluation PowerShell script](https://aka.ms/wdeppscript) to configure these features, but you can individually enable each feature with the cmdlets described in the rest of this document.
3535

3636
For more information about our endpoint protection products and services, see the following resources:
3737

3838
- [Next-generation protection overview](next-generation-protection.md)
39+
- [Microsoft Defender Antivirus in Windows](microsoft-defender-antivirus-windows.md)
40+
- [Microsoft Defender Antivirus on Windows Server](microsoft-defender-antivirus-on-windows-server.md)
41+
- [Protect devices from exploits](exploit-protection.md)
3942

40-
- [Microsoft Defender Antivirus](https://aka.ms/wdavdocs)
41-
- [Microsoft Defender Exploit Guard](https://aka.ms/wdegdocs)
42-
43-
This article describes configuration options in Windows 10 or newer and Windows Server 2016 or newer.
44-
45-
If you have any questions about a detection that Microsoft Defender AV makes, or you discover a missed detection, you can submit a file to us at [our sample submission help site.](https://www.microsoft.com/security/portal/mmpc/help/submission-help.aspx)
43+
This article describes configuration options in Windows 10 or newer and Windows Server 2016 or newer. If you have any questions about a detection that Microsoft Defender Antivirus makes, or you discover a missed detection, you can submit a file to us at [our sample submission help site.](https://www.microsoft.com/security/portal/mmpc/help/submission-help.aspx)
4644

4745
## Use PowerShell to enable the features
4846

@@ -55,7 +53,7 @@ To use these cmdlets:
5553

5654
You can check the status of all settings before you begin, or during your evaluation, by using the [Get-MpPreference PowerShell cmdlet](/powershell/module/defender/get-mppreference?view=windowsserver2022-ps&preserve-view=true).
5755

58-
Microsoft Defender AV indicates a detection through [standard Windows notifications](configure-notifications-microsoft-defender-antivirus.md). You can also [review detections in the Microsoft Defender AV app](review-scan-results-microsoft-defender-antivirus.md).
56+
Microsoft Defender Antivirus indicates a detection through [standard Windows notifications](configure-notifications-microsoft-defender-antivirus.md). You can also [review detections in the Microsoft Defender Antivirus app](review-scan-results-microsoft-defender-antivirus.md).
5957

6058
The Windows event log also records detection and engine events. [See the Microsoft Defender Antivirus events article for a list of event IDs](troubleshoot-microsoft-defender-antivirus.yml) and their corresponding actions.
6159

@@ -76,7 +74,7 @@ More details are available in [Use next-gen technologies in Microsoft Defender A
7674

7775
## Always-on protection (real-time scanning)
7876

79-
Microsoft Defender AV scans files as soon as they're seen by Windows, and will monitor running processes for known or suspected malicious behaviors. If the antivirus engine discovers malicious modification, it will immediately block the process or file from running.
77+
Microsoft Defender Antivirus scans files as soon as they're seen by Windows, and will monitor running processes for known or suspected malicious behaviors. If the antivirus engine discovers malicious modification, it will immediately block the process or file from running.
8078

8179
For more details on these options, see [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md).
8280

@@ -106,7 +104,7 @@ You can set Microsoft Defender Antivirus to automatically scan certain types of
106104

107105
## Manage product and protection updates
108106

109-
Typically, you receive Microsoft Defender AV updates from Windows update once per day. However, you can increase the frequency of those updates by setting the following options, and [ensuring that your updates are managed either in System Center Configuration Manager, with Group Policy, or in Intune](deploy-manage-report-microsoft-defender-antivirus.md).
107+
Typically, you receive Microsoft Defender Antivirus updates from Windows update once per day. However, you can increase the frequency of those updates by setting the following options, and [ensuring that your updates are managed either in System Center Configuration Manager, with Group Policy, or in Intune](deploy-manage-report-microsoft-defender-antivirus.md).
110108

111109
| Description | PowerShell Command |
112110
|---|---|

0 commit comments

Comments
 (0)