You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md
+54-30Lines changed: 54 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Configure Microsoft Defender Antivirus on a remote desktop or virtual desktop infrastructure environment
3
3
description: Get an overview of how to configure Microsoft Defender Antivirus in a remote desktop or non-persistent virtual desktop environment.
4
4
ms.localizationpriority: medium
5
-
ms.date: 08/22/2023
5
+
ms.date: 09/27/2024
6
6
ms.topic: conceptual
7
7
author: denisebmsft
8
8
ms.author: deniseb
@@ -51,12 +51,31 @@ This guide describes how to configure Microsoft Defender Antivirus on your VMs f
51
51
52
52
## Set up a dedicated VDI file share for security intelligence
53
53
54
-
In Windows 10, version 1903, Microsoft introduced the shared security intelligence feature, which offloads the unpackaging of downloaded security intelligence updates onto a host machine. This method reduces the usage of CPU, disk, and memory resources on individual machines. Shared security intelligence now works on Windows 10, version 1703 and later. You can set up this capability by using Group Policy or PowerShell, as described in the following table:
54
+
In Windows 10, version 1903, Microsoft introduced the shared security intelligence feature, which offloads the unpackaging of downloaded security intelligence updates onto a host machine. This method reduces the usage of CPU, disk, and memory resources on individual machines. Shared security intelligence now works on Windows 10, version 1703 and later. You can set up this capability by using Group Policy or PowerShell.
55
55
56
-
|Method | Procedure |
57
-
|---------|---------|
58
-
| Group Policy | 1. On your Group Policy management computer, open the Group Policy Management Console, right-click the Group Policy Object you want to configure, and then select **Edit**.<br/><br/>2. In the Group Policy Management Editor, go to **Computer configuration**.<br/><br/>Select **Administrative templates**.<br/><br/>Expand the tree to **Windows components**\>**Microsoft Defender Antivirus**\>**Security Intelligence Updates**.<br/><br/>3. Double-click **Define security intelligence location for VDI clients**, and then set the option to **Enabled**. A field automatically appears.<br/><br/>4. Enter `\\<sharedlocation\>\wdav-update` (for help with this value, see [Download and unpackage](#download-and-unpackage-the-latest-updates)).<br/><br/>5. Select **OK**.<br/><br/>Deploy the GPO to the VMs you want to test. |
59
-
| PowerShell | 1. On each RDS or VDI device, use the following cmdlet to enable the feature: `Set-MpPreference -SharedSignaturesPath \\<shared location>\wdav-update`. <br/><br/>2. Push the update as you normally would push PowerShell-based configuration policies onto your VMs. (See the [Download and unpackage](#download-and-unpackage-the-latest-updates) section the \<shared location\> entry.) |
56
+
### Group Policy
57
+
58
+
1. On your Group Policy management computer, open the Group Policy Management Console, right-click the Group Policy Object you want to configure, and then select **Edit**.
59
+
60
+
2. In the Group Policy Management Editor, go to **Computer configuration**.
61
+
62
+
3. Select **Administrative templates**. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Security Intelligence Updates**.
63
+
64
+
4. Double-click **Define security intelligence location for VDI clients**, and then set the option to **Enabled**.
65
+
66
+
A field automatically appears.
67
+
68
+
5. Enter `\\<Windows File Server shared location\>\wdav-update` (for help with this value, see [Download and unpackage](#download-and-unpackage-the-latest-updates)).
69
+
70
+
6. Select **OK**, and then deploy the GPO to the VMs you want to test.
71
+
72
+
### PowerShell
73
+
74
+
1. On each RDS or VDI device, use the following cmdlet to enable the feature:
75
+
76
+
`Set-MpPreference -SharedSignaturesPath \\<Windows File Server shared location>\wdav-update`
77
+
78
+
2. Push the update as you normally would push PowerShell-based configuration policies onto your VMs. (See the [Download and unpackage](#download-and-unpackage-the-latest-updates) section in this article. Look for the *shared location* entry.)
You can set a scheduled task to run once a day so that whenever the package is downloaded and unpacked then the VMs will receive the new update.
79
-
We suggest starting with once a day, but you should experiment with increasing or decreasing the frequency to understand the impact.
97
+
You can set a scheduled task to run once a day so that whenever the package is downloaded and unpacked then the VMs receive the new update. We suggest starting with once a day, but you should experiment with increasing or decreasing the frequency to understand the impact.
80
98
81
99
Security intelligence packages are typically published once every three to four hours. Setting a frequency shorter than four hours isn't advisable because it will increase the network overhead on your management machine for no benefit.
82
100
83
101
You can also set up your single server or machine to fetch the updates on behalf of the VMs at an interval and place them in the file share for consumption.
84
-
This configuration is possible when the devices have the share and read access (NTFS permissions) to the share so they can grab the updates. To set this configuration up, follow these steps:
102
+
This configuration is possible when the devices have the share and read access (NTFS permissions) to the share so they can grab the updates. To set up this configuration, follow these steps:
85
103
86
104
1. Create an SMB/CIFS file share.
87
105
88
-
2. Use the following example to create a file share with the following share permissions.
106
+
2. Use the following example to create a file share with the following share permissions.
89
107
90
-
```PowerShell
91
-
PS c:\> Get-SmbShareAccess -Name mdatp$
108
+
```PowerShell
109
+
110
+
PS c:\> Get-SmbShareAccess -Name mdatp$
92
111
93
-
Name ScopeName AccountName AccessControlType AccessRight
> An NTFS permission is added for **Authenticated Users:Read:**.
118
+
> [!NOTE]
119
+
> An NTFS permission is added for **Authenticated Users:Read:**.
100
120
101
-
For this example, the file share is:
121
+
For this example, the file share is `\\WindowsFileServer.fqdn\mdatp$\wdav-update`.
122
+
123
+
### Set a scheduled task to run the PowerShell script
102
124
103
-
`\\fileserver.fqdn\mdatp$\wdav-update`
125
+
1. On the management machine, open the Start menu and type `Task Scheduler`. From the results, Task Scheduler and then select **Create task...** on the side panel.
104
126
105
-
### Set a scheduled task to run the PowerShell script
127
+
2. Specify the name as `Security intelligence unpacker`.
128
+
129
+
3. On the **Trigger** tab, select **New...** > **Daily**, and select **OK**.
106
130
107
-
1. On the management machine, open the Start menu and type **Task Scheduler**. Open it and select **Create task...** on the side panel.
131
+
4. On the **Actions** tab, select **New...**.
108
132
109
-
2. Enter the name as **Security intelligence unpacker**. Go to the **Trigger** tab. Select **New...** \> **Daily**, and select **OK**.
133
+
5. Specify `PowerShell` in the **Program/Script**field.
110
134
111
-
3. Go to the **Actions** tab. Select **New...** Enter **PowerShell** in the **Program/Script** field. Enter `-ExecutionPolicy Bypass c:\wdav-update\vdmdlunpack.ps1` in the **Add arguments** field. Select **OK**.
135
+
6. In the **Add arguments**field, type`-ExecutionPolicy Bypass c:\wdav-update\vdmdlunpack.ps1`, and then select**OK**.
112
136
113
-
4. Configure any other settings as appropriate.
137
+
7. Configure any other settings as appropriate.
114
138
115
-
5. Select **OK** to save the scheduled task.
139
+
8. Select **OK** to save the scheduled task.
116
140
117
-
You can initiate the update manually by right-clicking on the task and then selecting **Run**.
141
+
To initiate the update manually, right-click on the task, and then select**Run**.
118
142
119
143
### Download and unpackage manually
120
144
121
145
If you would prefer to do everything manually, here's what to do to replicate the script's behavior:
122
146
123
-
1. Create a new folder on the system root called `wdav_update` to store intelligence updates, for example, create the folder `c:\wdav_update`.
147
+
1. Create a new folder on the system root called `wdav_update` to store intelligence updates. For example, create the folder `c:\wdav_update`.
124
148
125
-
2. Create a subfolder under *wdav_update* with a GUID name, such as `{00000000-0000-0000-0000-000000000000}`
149
+
2. Create a subfolder under `wdav_update` with a GUID name, such as `{00000000-0000-0000-0000-000000000000}`
126
150
127
151
Here's an example: `c:\wdav_update\{00000000-0000-0000-0000-000000000000}`
128
152
@@ -131,7 +155,7 @@ If you would prefer to do everything manually, here's what to do to replicate th
131
155
132
156
3. Download a security intelligence package from [https://www.microsoft.com/wdsi/definitions](https://www.microsoft.com/wdsi/definitions) into the GUID folder. The file should be named `mpam-fe.exe`.
133
157
134
-
4. Open a cmd prompt window and navigate to the GUID folder you created. Use the **/X** extraction command to extract the files, for example `mpam-fe.exe /X`.
158
+
4. Open a Command Prompt window and navigate to the GUID folder you created. Use the `/X` extraction command to extract the files. For example `mpam-fe.exe /X`.
135
159
136
160
> [!NOTE]
137
161
> The VMs will pick up the updated package whenever a new GUID folder is created with an extracted update package or whenever an existing folder is updated with a new extracted package.
0 commit comments