You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-advanced-scan-types-microsoft-defender-antivirus.md
+7-10Lines changed: 7 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.custom: nextgen
9
9
ms.reviewer: pahuijbr
10
10
manager: deniseb
11
11
ms.subservice: ngp
12
-
ms.date: 07/10/2024
12
+
ms.date: 11/01/2024
13
13
ms.collection:
14
14
- m365-security
15
15
- tier2
@@ -39,10 +39,7 @@ For details on configuring Microsoft Configuration Manager (current branch), see
39
39
## Use Group Policy to configure scanning options
40
40
41
41
> [!TIP]
42
-
> Download the Group Policy Reference Spreadsheet, which lists the policy settings for computer and user configurations that are included in the Administrative template files delivered with for Windows. You can configure refer to the spreadsheet when you edit Group Policy Objects.
43
-
>
44
-
> Here are the most recent versions:
45
-
>
42
+
> Download the Group Policy Reference Spreadsheet, which lists the policy settings for computer and user configurations that are included in the Administrative template files delivered with for Windows. You can configure refer to the spreadsheet when you edit Group Policy Objects. Here are the most recent versions:
46
43
> -[Group Policy Settings Reference Spreadsheet for Windows 10 May 2020 Update (2004)](https://www.microsoft.com/download/details.aspx?id=101451)
47
44
> -[Group Policy Settings Reference Spreadsheet for Windows 11 October 2021 Update (21H2)](https://www.microsoft.com/download/details.aspx?id=103506)
48
45
@@ -68,7 +65,7 @@ For details on configuring Microsoft Configuration Manager (current branch), see
68
65
|Scan mapped network drives<br/>**Scan**\>**Run full scan on mapped network drives**|Disabled|`-DisableScanningMappedNetworkDrivesForFullScan`|
69
66
|Scan archive files (such as .zip or .rar files). <br/>**Scan**\>**Scan archive files**|Enabled|`-DisableArchiveScanning` <br/><br/>The [extensions exclusion list](configure-extension-file-exclusions-microsoft-defender-antivirus.md) will take precedence over this setting.|
70
67
|Scan files on the network <br/>**Scan**\>**Scan network files**|Disabled|`-DisableScanningNetworkFiles`|
71
-
|Scan packed executables<br/>**Scan**\>**Scan packed executables**|Enabled|Not available <br/><br/>Scan packed executables were removed from the following templates:<br/>- Administrative Templates (.admx) for Windows 11 2022 Update (22H2)<br/>- Administrative Templates (.admx) for Windows 11 October 2021 Update (21H2)|
68
+
|Scan packed executables<br/>**Scan**\>**Scan packed executables**|Enabled|Not available <br/><br/>Scan packed executables were removed from the following templates:<br/>- Administrative Templates (.admx) for Windows 11 2023 Update (23H2)<br/>- Administrative Templates (.admx) for Windows 11 2022 Update (22H2) - v3.0 <br/>- Administrative Templates (.admx) for Windows 11 2022 Update (22H2)<br/>- Administrative Templates (.admx) for Windows 11 October 2021 Update (21H2)|
72
69
|Scan removable drives during full scans only<br/>**Scan**\>**Scan removable drives**|Disabled|`-DisableRemovableDriveScanning`|
73
70
|Specify the level of subfolders within an archive folder to scan <p>**Scan**\>**Specify the maximum depth to scan archive files**|0|Not available|
74
71
|Specify the maximum CPU load (as a percentage) during a scan. <p> **Scan**\>**Specify the maximum percentage of CPU utilization during a scan**|50|`-ScanAvgCPULoadFactor`<br/><br/> The maximum CPU load is not a hard limit, but is guidance for the scanning engine to not exceed the maximum on average. Manual scans ignore this setting and run without any CPU limits.|
@@ -93,11 +90,11 @@ See [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/wi
93
90
94
91
Email scanning enables scanning of email files used by Outlook and other mail clients during on-demand and scheduled scans. Embedded objects within email (such as attachments and archived files) are also scanned. The following file format types can be scanned and remediated:
95
92
96
-
- DBX
97
-
- MBX
98
-
- MIME
93
+
-`DBX`
94
+
-`MBX`
95
+
-`MIME`
99
96
100
-
PST files used by Outlook 2003 or older (where the archive type is set to non-unicode) are also scanned, but Microsoft Defender Antivirus cannot remediate threats that are detected inside PST files.
97
+
`PST` files used by Outlook 2003 or older (where the archive type is set to non-unicode) are also scanned, but Microsoft Defender Antivirus cannot remediate threats that are detected inside `PST` files.
101
98
102
99
If Microsoft Defender Antivirus detects a threat inside an email message, the following information is displayed to assist you in identifying the compromised email so you can remediate the threat manually:
Copy file name to clipboardExpand all lines: defender-endpoint/machine-tags.md
+3-6Lines changed: 3 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: denisebmsft
7
7
ms.localizationpriority: medium
8
8
manager: deniseb
9
9
audience: ITPro
10
-
ms.collection:
10
+
ms.collection:
11
11
- m365-security
12
12
- tier2
13
13
ms.topic: reference
@@ -32,7 +32,7 @@ ms.date: 02/27/2023
32
32
Add tags on devices to create a logical group affiliation. Device tags support proper mapping of the network, enabling you to attach different tags to capture context and to enable dynamic list creation as part of an incident. Tags can be used as a filter in the **Device inventory** view, or to group devices. For more information on device grouping, see [Create and manage device groups](machine-groups.md).
33
33
34
34
> [!NOTE]
35
-
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
35
+
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
36
36
37
37
You can add tags on devices using the following ways:
38
38
@@ -62,7 +62,6 @@ To add device tags using API, see [Add or remove device tags API](api/add-or-rem
62
62
2. Select **Manage tags** from the row of Response actions.
63
63
64
64
:::image type="content" source="media/manage-tags-option.png" alt-text="Image of manage tags button" lightbox="media/manage-tags-option.png":::
65
-
66
65
67
66
3. Type to find or create tags
68
67
@@ -81,7 +80,7 @@ You can also delete tags from this view.
81
80
82
81
## Add device tags using dynamic rules for device tagging
83
82
84
-
You can create and manage rules that automatically assign and remove tags from devices based on user-defined criteria directly in the Microsoft Defender portal. Please refer to following documents for details
83
+
You can create and manage rules that automatically assign and remove tags from devices based on user-defined criteria directly in the Microsoft Defender portal. Please refer to following documents for details:
85
84
86
85
-[Manage your devices with ease using dynamic rules for device tagging in Microsoft Defender](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/manage-your-devices-with-ease-using-dynamic-rules-for-device/ba-p/4024988)
87
86
-[Asset rule management - Dynamic rules for devices](/defender-xdr/configure-asset-rules)
@@ -157,8 +156,6 @@ You can use Microsoft Intune to define and apply device tags. You can perform th
157
156
158
157
- In the [OMA-IRU settings](/mem/intune/configuration/custom-settings-windows-10) section, for **Data type**, choose **String**. For **OMA-URI**, type (or paste) `./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/DeviceTagging/Group`.
159
158
160
-
161
-
162
159
## Add device tags by creating app configuration policy in Microsoft Intune
0 commit comments