You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-advanced-scan-types-microsoft-defender-antivirus.md
+22-19Lines changed: 22 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.custom: nextgen
9
9
ms.reviewer: pahuijbr
10
10
manager: deniseb
11
11
ms.subservice: ngp
12
-
ms.date: 12/26/2024
12
+
ms.date: 02/18/2025
13
13
ms.collection:
14
14
- m365-security
15
15
- tier2
@@ -34,46 +34,49 @@ For more information, see [Configure device restriction settings in Microsoft In
34
34
35
35
## Use Microsoft Configuration Manager to configure scanning options
36
36
37
-
For details on configuring Microsoft Configuration Manager (current branch), see [How to create and deploy antimalware policies: Scan settings](/configmgr/protect/deploy-use/endpoint-antimalware-policies#scan-settings).
37
+
For details on configuring Microsoft Configuration Manager (current branch), see [How to create and deploy anti-malware policies: Scan settings](/configmgr/protect/deploy-use/endpoint-antimalware-policies#scan-settings).
38
38
39
39
## Use Group Policy to configure scanning options
40
40
41
41
> [!TIP]
42
-
> Download the Group Policy Reference Spreadsheet, which lists the policy settings for computer and user configurations that are included in the Administrative template files delivered with for Windows. You can configure refer to the spreadsheet when you edit Group Policy Objects. Here are the most recent versions:
42
+
> Download the Group Policy Reference Spreadsheet, which lists the policy settings for computer and user configurations that are included in the Administrative template files delivered for Windows. Refer to the spreadsheet when you edit Group Policy Objects. Here are the most recent versions:
43
43
> -[Group Policy Settings Reference Spreadsheet for Windows 10 May 2020 Update (2004)](https://www.microsoft.com/download/details.aspx?id=101451)
44
44
> -[Group Policy Settings Reference Spreadsheet for Windows 11 October 2021 Update (21H2)](https://www.microsoft.com/download/details.aspx?id=103506)
45
45
46
46
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
47
47
48
48
2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
49
49
50
-
3. In the **Group Policy Management Editor** go to **Computer configuration** and click**Administrative templates**.
50
+
3. In the **Group Policy Management Editor** go to **Computer configuration** and select**Administrative templates**.
51
51
52
52
4. Expand the tree to **Windows components**\>**Microsoft Defender Antivirus**, and then select a location (refer to [Settings and locations](#settings-and-locations) in this article).
53
53
54
54
5. Edit the policy object.
55
55
56
-
6.Click**OK**, and repeat for any other settings.
56
+
6.Select**OK**, and repeat for any other settings.
57
57
58
58
### Settings and locations
59
59
60
60
|Policy item and location|Default setting <br/>(if not configured)|PowerShell `Set-MpPreference` parameter <br/>or WMI property for `MSFT_MpPreference` class|
61
61
|---|---|---|
62
-
|Email scanning <br/> **Scan**\>**Turn on e-mail scanning**<br/>See [Email scanning limitations](#email-scanning-limitations) (in this article)|Disabled|`-DisableEmailScanning`|
63
-
| Script scanning | Enabled | This policy setting allows you to configure script scanning. If you enable or do not configure this setting, script scanning is enabled. <br/><br/>See [Defender/AllowScriptScanning](/windows/client-management/mdm/policy-csp-defender)|
64
-
|Scan [reparse points](/windows/win32/fileio/reparse-points) <br/> **Scan**\>**Turn on reparse point scanning**|Disabled|Not available <br/>See [Reparse points](/windows/win32/fileio/reparse-points)|
65
-
|Scan mapped network drives<br/>**Scan**\>**Run full scan on mapped network drives**|Disabled|`-DisableScanningMappedNetworkDrivesForFullScan`|
66
-
|Scan archive files (such as .zip or .rar files). <br/>**Scan**\>**Scan archive files**|Enabled|`-DisableArchiveScanning` <br/><br/>The [extensions exclusion list](configure-extension-file-exclusions-microsoft-defender-antivirus.md) will take precedence over this setting.|
67
-
|Scan files on the network <br/>**Scan**\>**Scan network files**|Disabled|`-DisableScanningNetworkFiles`|
68
-
|Scan packed executables<br/>**Scan**\>**Scan packed executables**|Enabled|Not available <br/><br/>Scan packed executables were removed from the following templates:<br/>- Administrative Templates (.admx) for Windows 11 2023 Update (23H2)<br/>- Administrative Templates (.admx) for Windows 11 2022 Update (22H2) - v3.0 <br/>- Administrative Templates (.admx) for Windows 11 2022 Update (22H2)<br/>- Administrative Templates (.admx) for Windows 11 October 2021 Update (21H2)|
69
-
|Scan removable drives during full scans only<br/>**Scan**\>**Scan removable drives**|Disabled|`-DisableRemovableDriveScanning`|
70
-
|Specify the level of subfolders within an archive folder to scan <p>**Scan**\>**Specify the maximum depth to scan archive files**|0|Not available|
71
-
|Specify the maximum CPU load (as a percentage) during a scan. <p> **Scan**\>**Specify the maximum percentage of CPU utilization during a scan**|50|`-ScanAvgCPULoadFactor`<br/><br/> The maximum CPU load is not a hard limit, but is guidance for the scanning engine to not exceed the maximum on average. Manual scans ignore this setting and run without any CPU limits.|
72
-
|Specify the maximum size (in kilobytes) of archive files that should be scanned.<br/>**Scan**\>**Specify the maximum size of archive files to be scanned**|No limit|Not available <br/><br/>The default value of 0 applies no limit|
73
-
|Configure low CPU priority for scheduled scans<br/>**Scan**\>**Configure low CPU priority for scheduled scans**|Disabled|Not available|
62
+
|Email scanning <br/> **Scan** > **Turn on e-mail scanning**<br/>See [Email scanning limitations](#email-scanning-limitations) (in this article)|Disabled|`-DisableEmailScanning`|
63
+
| Script scanning | Enabled | This policy setting allows you to configure script scanning. If you enable or don't configure this setting, script scanning is enabled. <br/><br/>See [Defender/AllowScriptScanning](/windows/client-management/mdm/policy-csp-defender)|
64
+
|Scan [reparse points](/windows/win32/fileio/reparse-points) <br/> **Scan** > **Turn on reparse point scanning**|Disabled|Not available <br/>See [Reparse points](/windows/win32/fileio/reparse-points)|
65
+
|Scan mapped network drives<br/>**Scan** > **Run full scan on mapped network drives**|Disabled|`-DisableScanningMappedNetworkDrivesForFullScan`|
66
+
|Scan archive files (such as .zip or .rar files). <br/>**Scan** > **Scan archive files**|Enabled|`-DisableArchiveScanning` <br/><br/>The [extensions exclusion list](configure-extension-file-exclusions-microsoft-defender-antivirus.md) takes precedence over this setting.|
67
+
|Scan files on the network <br/>**Scan** > **Scan network files**|Disabled|`-DisableScanningNetworkFiles`|
68
+
|Scan packed executables<br/>**Scan** > **Scan packed executables**|Enabled|Not available <br/><br/>Scan packed executables were removed from the following templates:<br/>- Administrative Templates (.admx) for Windows 11 2023 Update (23H2)<br/>- Administrative Templates (.admx) for Windows 11 2022 Update (22H2) - v3.0 <br/>- Administrative Templates (.admx) for Windows 11 2022 Update (22H2)<br/>- Administrative Templates (.admx) for Windows 11 October 2021 Update (21H2)|
69
+
|Scan removable drives during full scans only<br/>**Scan** > **Scan removable drives**|Disabled|`-DisableRemovableDriveScanning`|
70
+
|Specify the level of subfolders within an archive folder to scan <p>**Scan** > **Specify the maximum depth to scan archive files**|0|Not available|
71
+
|Specify the maximum CPU load (as a percentage) during a scan. <p> **Scan** > **Specify the maximum percentage of CPU utilization during a scan**|50|`-ScanAvgCPULoadFactor`<br/><br/> The maximum CPU load isn't a hard limit, but is guidance for the scanning engine to not exceed the maximum on average. Manual scans ignore this setting and run without any CPU limits.|
72
+
|Specify the maximum size (in kilobytes) of archive files that should be scanned.<br/>**Scan** > **Specify the maximum size of archive files to be scanned**|No limit|Not available <br/><br/>The default value of 0 applies no limit|
73
+
|Configure low CPU priority for scheduled scans<br/>**Scan** > **Configure low CPU priority for scheduled scans**|Disabled|Not available|
74
+
|Configure scanning of network files <br/>**Scan** > **Configure scanning of network files**|Enabled|-DisableScanningNetworkFiles|
75
+
|CPU throttling type <br/>**Scan** > **CPU throttling type**|Disabled|-ThrottleForScheduledScanOnly |
76
+
|Scan excluded files and directories during quick scan <br/>**Scan** > **Scan excluded files and directories during quick scan**|Disabled|Not available|
74
77
75
78
> [!NOTE]
76
-
> If real-time protection is turned on, files are scanned before they are accessed and executed. The scanning scope includes all files, including files on mounted removable media, such as USB drives. If the device performing the scan has real-time protection or on-access protection turned on, the scan also includes network shares.
79
+
> If real-time protection is turned on, files are scanned before they're accessed and executed. The scanning scope includes all files, such as files on mounted removable media, like USB drives. If the device performing the scan has real-time protection or on-access protection turned on, the scan also includes network shares.
77
80
78
81
> [!TIP]
79
82
> If you have a Network-Attached Storage (NAS) or Storage Area Network (SAN), you can use Internet Content Adaption Protocol (ICAP) scanning with the Microsoft Defender Antivirus engine. For more information, see **[Tech Community Blog: MetaDefender ICAP with Windows Defender Antivirus: World-class security for hybrid environments](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/metadefender-icap-with-windows-defender-antivirus-world-class/ba-p/800234)**.
@@ -97,7 +100,7 @@ Email scanning enables scanning of email files used by Outlook and other mail cl
97
100
-`MBX`
98
101
-`MIME`
99
102
100
-
`PST` files used by Outlook 2003 or older (where the archive type is set to non-unicode) are also scanned, but Microsoft Defender Antivirus cannot remediate threats that are detected inside `PST` files.
103
+
`PST` files used by Outlook 2003 or older (where the archive type is set to nonunicode) are also scanned, but Microsoft Defender Antivirus can't remediate threats that are detected inside `PST` files.
101
104
102
105
If Microsoft Defender Antivirus detects a threat inside an email message, the following information is displayed to assist you in identifying the compromised email so you can remediate the threat manually:
Copy file name to clipboardExpand all lines: defender-endpoint/manage-outdated-endpoints-microsoft-defender-antivirus.md
+25-8Lines changed: 25 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Apply Microsoft Defender Antivirus protection updates to out of date endpoints
3
-
description: Define when and how updates should be applied for endpoints that haven't updated in a while.
3
+
description: Define when and how updates should be applied for out of date endpoints in Microsoft Defender Antivirus.
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
6
ms.topic: conceptual
@@ -14,7 +14,7 @@ ms.collection:
14
14
- m365-security
15
15
- tier3
16
16
search.appverid: met150
17
-
ms.date: 04/08/2021
17
+
ms.date: 02/18/2025
18
18
---
19
19
20
20
# Manage Microsoft Defender Antivirus updates and scans for endpoints that are out of date
@@ -45,7 +45,7 @@ You can use one of several methods to set up catch-up protection updates:
45
45
46
46
### Use Configuration Manager to configure catch-up protection updates
47
47
48
-
1. On your Microsoft Configuration Manager console, open the antimalware policy you want to change (select **Assets and Compliance** in the navigation pane on the left, then expand the tree to **Overview**\>**Endpoint Protection**\>**Antimalware Policies**)
48
+
1. On your Microsoft Configuration Manager console, open the anti-malware policy you want to change (select **Assets and Compliance** in the navigation pane on the left, then expand the tree to **Overview**\>**Endpoint Protection**\>**Antimalware Policies**)
49
49
50
50
2. Go to the **Security intelligence updates** section and configure the following settings:
51
51
@@ -58,7 +58,7 @@ You can use one of several methods to set up catch-up protection updates:
58
58
59
59
### Use Group Policy to enable and configure the catch-up update feature
60
60
61
-
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and then select **Edit**.
61
+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)). Right-click the Group Policy Object you want to configure and then select **Edit**.
62
62
63
63
2. In the **Group Policy Management Editor** go to **Computer configuration**.
64
64
@@ -119,9 +119,9 @@ You can use Group Policy to specify the number of days after which endpoint prot
119
119
120
120
4. Select **OK**.
121
121
122
-
## Set up catch-up scans for endpoints that have not been scanned for a while
122
+
## Set up catch-up scans for endpoints that haven't been scanned for a while
123
123
124
-
You can set the number of consecutive scheduled scans that can be missed before Microsoft Defender Antivirus will force a scan.
124
+
You can set the number of consecutive scheduled scans that can be missed before Microsoft Defender Antivirus forces a scan.
125
125
126
126
The process for enabling this feature is:
127
127
@@ -145,7 +145,7 @@ You can use one of several methods to set up catch-up scans:
145
145
146
146
### Use Group Policy to enable and configure the catch-up scan feature
147
147
148
-
1. Ensure you have set up at least one scheduled scan.
148
+
1. Ensure you set up at least one scheduled scan.
149
149
150
150
2. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**.
151
151
@@ -193,14 +193,31 @@ See the following article for more information and allowed parameters:
193
193
194
194
### Use Configuration Manager to configure catch-up scans
195
195
196
-
1. On your Microsoft Configuration Manager console, open the antimalware policy you want to change (select **Assets and Compliance** in the navigation pane on the left, then expand the tree to **Overview**\>**Endpoint Protection**\>**Antimalware Policies**)
196
+
1. On your Microsoft Configuration Manager console, open the anti-malware policy you want to change (select **Assets and Compliance** in the navigation pane on the left, then expand the tree to **Overview**\>**Endpoint Protection**\>**Antimalware Policies**)
197
197
198
198
2. Go to the **Scheduled scans** section and **Force a scan of the selected scan type if client computer is offline...** to **Yes**.
199
199
200
200
3. Select **OK**.
201
201
202
202
4.[Deploy the updated policy as usual](/sccm/protect/deploy-use/endpoint-antimalware-policies#deploy-an-antimalware-policy-to-client-computers).
203
203
204
+
### Use Group Policy to configure security intelligence updates over a metered connection
205
+
206
+
1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and select **Edit**.
207
+
208
+
1. In the **Group Policy Management Editor**, go to **Computer configuration**.
209
+
210
+
1. Select **Policies** and then select **Administrative templates**.
211
+
212
+
1. Expand the tree to **Windows components > Microsoft Defender Antivirus > Security Intelligence Update** and configure the following settings:
213
+
214
+
- If you have set up scheduled quick scans, double-click the Allow Microsoft Defender Antivirus to update and communicate over a metered connection setting and set the option to **Enabled**.
215
+
- Select **OK**.
216
+
217
+
|Settings| Description| Default |
218
+
| -------- | -------- | -------- |
219
+
|Allow Microsoft Defender Antivirus to update and communicate over a metered connection.|Enabling this policy will automatically download updates, even over metered data connections (charges may apply)| Disabled |
220
+
204
221
> [!TIP]
205
222
> If you're looking for Antivirus related information for other platforms, see:
206
223
> -[Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
0 commit comments