You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-antivirus-on-windows-server.md
+17-62Lines changed: 17 additions & 62 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,15 +77,16 @@ To verify that firewall protection is turned on using PowerShell, run the follow
77
77
78
78
To view verify the state of all services using Command Prompt, run the following command: `sc query state= all`.
79
79
80
-
## Update antimalware security intelligence
81
-
82
80
> [!IMPORTANT]
83
-
> Beginning with [platform version 4.18.2208.0 and later](/defender-endpoint/msda-updates-previous-versions-technical-upgrade-support#september-2022-platform-41822097--engine-11197003), if a server is onboarded to Defender for Endpoint, the "Turn off Windows Defender" setting in [Group Policy](configure-endpoints-gp.md#update-endpoint-protection-configuration) no longer completely disables Windows Defender Antivirus on Windows Server 2012 R2 and later. Instead, it will places Microsoft Defender Antivirus into passive mode. In addition, the [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) feature allows Microsoft Defender Antivirus to switch to active mode but not to passive mode.
84
-
>
85
-
> - If "Turn off Windows Defender" is already in place before onboarding to Microsoft Defender for Endpoint, there will be no change and Defender Antivirus will remain disabled.
86
-
> - To switch Defender Antivirus to passive mode, even if it was disabled before onboarding, you can apply the [ForceDefenderPassiveMode configuration](switch-to-mde-phase-2.md#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) with a value of `1`. To place it into active mode, switch this value to `0` instead.
87
-
>
88
-
> Note the modified logic for `ForceDefenderPassiveMode` when tamper protection is enabled: Once Microsoft Defender Antivirus is toggled to active mode, tamper protection will prevent it from going back into passive mode even when `ForceDefenderPassiveMode` is set to `1`.
81
+
> Beginning with [platform version 4.18.2208.0 and later](/defender-endpoint/msda-updates-previous-versions-technical-upgrade-support#september-2022-platform-41822097--engine-11197003), if a server is onboarded to Defender for Endpoint, the "Turn off Windows Defender" setting in [Group Policy](configure-endpoints-gp.md#update-endpoint-protection-configuration) no longer completely disables Windows Defender Antivirus on Windows Server 2012 R2 and later. Instead, it places Microsoft Defender Antivirus into passive mode. In addition, the [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) feature allows Microsoft Defender Antivirus to switch to active mode but not to passive mode.
82
+
>
83
+
> If "Turn off Windows Defender" is already set before onboarding the device to Defender for Endpoint, there's no change and Microsoft Defender Antivirus remains disabled.
84
+
>
85
+
> To switch Microsoft Defender Antivirus to passive mode, even if it was disabled before onboarding, you can apply the [ForceDefenderPassiveMode configuration](switch-to-mde-phase-2.md#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) with a value of `1`. To place it into active mode, switch this value to `0` instead.
86
+
>
87
+
> Note the modified logic for `ForceDefenderPassiveMode` when tamper protection is enabled: Once Microsoft Defender Antivirus is toggled to active mode, tamper protection will prevents Microsoft Defender Antivirus from going into passive mode, even if `ForceDefenderPassiveMode` is set to `1`.
88
+
89
+
## Update antimalware security intelligence
89
90
90
91
To get your regular security intelligence updates, the Windows Update service must be running. If you use an update management service, like Windows Server Update Services (WSUS), make sure Microsoft Defender Antivirus Security intelligence updates are approved for the computers you manage.
91
92
@@ -106,62 +107,16 @@ The following table lists the services for Microsoft Defender Antivirus and the
106
107
107
108
| Service Name | File Location | Description |
108
109
|---|---|---|
109
-
| Windows Defender Service (WinDefend) |`C:\Program Files\Windows Defender\MsMpEng.exe`| This service is the main Microsoft Defender Antivirus service that needs to be running always.|
110
-
| Windows Error Reporting Service (Wersvc) |`C:\WINDOWS\System32\svchost.exe -k WerSvcGroup`| This service sends error reports back to Microsoft. |
111
-
| Windows Firewall (MpsSvc) |`C:\WINDOWS\system32\svchost.exe -k LocalServiceNoNetwork`| We recommend keeping the Windows Firewall service enabled. |
112
-
| Windows Update (Wuauserv) |`C:\WINDOWS\system32\svchost.exe -k netsvcs`| Windows Update is needed to get Security intelligence updates and antimalware engine updates |
113
-
114
-
## Submit samples
110
+
| Windows Defender Service (`WinDefend`) |`C:\Program Files\Windows Defender\MsMpEng.exe`| This service is the main Microsoft Defender Antivirus service that needs to be running always.|
111
+
| Windows Error Reporting Service (`Wersvc`) |`C:\WINDOWS\System32\svchost.exe -k WerSvcGroup`| This service sends error reports back to Microsoft. |
112
+
| Windows Firewall (`MpsSvc`) |`C:\WINDOWS\system32\svchost.exe -k LocalServiceNoNetwork`| We recommend keeping the Windows Firewall service enabled. |
113
+
| Windows Update (`Wuauserv`) |`C:\WINDOWS\system32\svchost.exe -k netsvcs`| Windows Update is needed to get Security intelligence updates and antimalware engine updates |
115
114
116
-
Sample submission allows Microsoft to collect samples of potentially malicious software. To help provide continued and up-to-date protection, Microsoft researchers use these samples to analyze suspicious activities and produce updated antimalware Security intelligence. We collect program executable files, such as .exe files and .dll files. We don't collect files that contain personal data, like Microsoft Word documents and PDF files.
115
+
## Additional settings to consider
117
116
118
-
### Submit a file
119
-
120
-
1. Review the [submission guide](/unified-secops-platform/submission-guide).
121
-
122
-
2. Visit the [sample submission portal](https://www.microsoft.com/wdsi/filesubmission), and submit your file.
123
-
124
-
### Enable automatic sample submission
125
-
126
-
To enable automatic sample submission, start a Windows PowerShell console as an administrator, and set the **SubmitSamplesConsent** value data according to one of the following settings:
127
-
128
-
|Setting|Description|
129
-
|---|---|
130
-
|**0** - **Always prompt**| The Microsoft Defender Antivirus service prompts you to confirm submission of all required files. This setting is the default for Microsoft Defender Antivirus, but isn't recommended for installations on Windows Server 2016 or 2019, or Windows Server 2022 and later without a GUI. |
131
-
|**1** - **Send safe samples automatically**| The Microsoft Defender Antivirus service sends all files marked as "safe" and prompts for the remainder of the files. |
132
-
|**2** - **Never send**| The Microsoft Defender Antivirus service doesn't prompt and doesn't send any files. |
133
-
|**3** - **Send all samples automatically**| The Microsoft Defender Antivirus service sends all files without a prompt for confirmation. |
134
-
135
-
> [!NOTE]
136
-
> This option is not available for Windows Server 2012 R2.
137
-
138
-
## Configure automatic exclusions
139
-
140
-
To help ensure security and performance, certain exclusions are automatically added based on the roles and features you install when using Microsoft Defender Antivirus on Windows Server 2016, Windows Server 2019, Windows Server 2022, or Windows Server 2025.
141
-
142
-
See [Configure exclusions in Microsoft Defender Antivirus on Windows Server](configure-server-exclusions-microsoft-defender-antivirus.md).
143
-
144
-
## Passive mode and Windows Server
145
-
146
-
If you're using a non-Microsoft antivirus product as your primary antivirus solution on Windows Server, you must set Microsoft Defender Antivirus to passive mode or disable it manually.
147
-
148
-
- If your Windows Server endpoint is onboarded to Microsoft Defender for Endpoint, you can set Microsoft Defender Antivirus to passive mode.
149
-
- If you're not using Microsoft Defender for Endpoint, set Microsoft Defender Antivirus to disabled mode.
150
-
151
-
If you uninstall your non-Microsoft antivirus product, make sure to re-enable Microsoft Defender Antivirus. See [Re-enable Microsoft Defender Antivirus on Windows Server if it was disabled](/defender-endpoint/enable-update-mdav-to-latest-ws#re-enable-microsoft-defender-antivirus-on-windows-server-if-it-was-disabled).
152
-
153
-
The following table describes methods to set Microsoft Defender Antivirus to passive mode, disable Microsoft Defender Antivirus, and uninstall Microsoft Defender Antivirus:
154
-
155
-
| Procedure | Description |
156
-
|---|---|
157
-
| Set Microsoft Defender Antivirus to passive mode by using a registry key | Set the `ForceDefenderPassiveMode` registry key as follows: <br/>- Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection` <br/>- Name: `ForceDefenderPassiveMode` <br/>- Type: `REG_DWORD` <br/>- Value: `1`|
158
-
| Turn off the Microsoft Defender Antivirus user interface using PowerShell (Windows Server 2016 only)| Open Windows PowerShell as an administrator, and run the following PowerShell cmdlet: `Uninstall-WindowsFeature -Name Windows-Defender-GUI`|
159
-
| Disable Microsoft Defender Antivirus real-time protection using PowerShell | Use the following PowerShell cmdlet: `Set-MpPreference -DisableRealtimeMonitoring $true`|
160
-
| Disable Microsoft Defender Antivirus using the Remove Roles and Features wizard | See [Install or Uninstall Roles, Role Services, or Features](/windows-server/administration/server-manager/install-or-uninstall-roles-role-services-or-features#remove-roles-role-services-and-features-by-using-the-remove-roles-and-features-wizard), and use the **Remove Roles and Features Wizard**. <br/><br/>When you get to the **Features** step of the wizard, clear the **Windows Defender Features** option. <br/><br/> If you clear **Windows Defender** by itself under the **Windows Defender Features** section, you're prompted to remove the interface option **GUI for Windows Defender**.<br/><br/>Microsoft Defender Antivirus runs normally without the user interface, but the user interface can't be enabled if you disable the core **Windows Defender** feature. |
161
-
| Uninstall Microsoft Defender Antivirus using PowerShell | Use the following PowerShell cmdlet: `Uninstall-WindowsFeature -Name Windows-Defender`|
162
-
| Disable Microsoft Defender Antivirus using Group Policy | In your Local Group Policy Editor, navigate to **Administrative Template** > **Windows Component** > **Endpoint Protection** > **Disable Endpoint Protection**, and then select **Enabled** > **OK**. |
163
-
164
-
For more information, see [Working with Registry Keys](/powershell/scripting/samples/working-with-registry-keys).
117
+
-[Turn on cloud protection in Microsoft Defender Antivirus](enable-cloud-protection-microsoft-defender-antivirus.md)
118
+
-[Configure Microsoft Defender Antivirus exclusions on Windows Server](configure-server-exclusions-microsoft-defender-antivirus.md)
119
+
-[Learn more about Windows Server and passive mode](microsoft-defender-antivirus-compatibility.md#windows-server-and-passive-mode)
165
120
166
121
### Are you using Windows Server 2012 R2 or Windows Server 2016?
0 commit comments