Skip to content

Commit 98ecaeb

Browse files
authored
Merge pull request #1782 from MicrosoftDocs/main
pushing MDAV doc updates live
2 parents 3d75163 + d007989 commit 98ecaeb

File tree

7 files changed

+113
-160
lines changed

7 files changed

+113
-160
lines changed

defender-endpoint/configure-advanced-scan-types-microsoft-defender-antivirus.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.custom: nextgen
99
ms.reviewer: pahuijbr
1010
manager: deniseb
1111
ms.subservice: ngp
12-
ms.date: 07/10/2024
12+
ms.date: 11/01/2024
1313
ms.collection:
1414
- m365-security
1515
- tier2
@@ -39,10 +39,7 @@ For details on configuring Microsoft Configuration Manager (current branch), see
3939
## Use Group Policy to configure scanning options
4040

4141
> [!TIP]
42-
> Download the Group Policy Reference Spreadsheet, which lists the policy settings for computer and user configurations that are included in the Administrative template files delivered with for Windows. You can configure refer to the spreadsheet when you edit Group Policy Objects.
43-
>
44-
> Here are the most recent versions:
45-
>
42+
> Download the Group Policy Reference Spreadsheet, which lists the policy settings for computer and user configurations that are included in the Administrative template files delivered with for Windows. You can configure refer to the spreadsheet when you edit Group Policy Objects. Here are the most recent versions:
4643
> - [Group Policy Settings Reference Spreadsheet for Windows 10 May 2020 Update (2004)](https://www.microsoft.com/download/details.aspx?id=101451)
4744
> - [Group Policy Settings Reference Spreadsheet for Windows 11 October 2021 Update (21H2)](https://www.microsoft.com/download/details.aspx?id=103506)
4845
@@ -68,7 +65,7 @@ For details on configuring Microsoft Configuration Manager (current branch), see
6865
|Scan mapped network drives<br/>**Scan** \> **Run full scan on mapped network drives**|Disabled|`-DisableScanningMappedNetworkDrivesForFullScan`|
6966
|Scan archive files (such as .zip or .rar files). <br/>**Scan** \> **Scan archive files**|Enabled|`-DisableArchiveScanning` <br/><br/>The [extensions exclusion list](configure-extension-file-exclusions-microsoft-defender-antivirus.md) will take precedence over this setting.|
7067
|Scan files on the network <br/>**Scan** \> **Scan network files**|Disabled|`-DisableScanningNetworkFiles`|
71-
|Scan packed executables<br/>**Scan** \> **Scan packed executables**|Enabled|Not available <br/><br/>Scan packed executables were removed from the following templates:<br/>- Administrative Templates (.admx) for Windows 11 2022 Update (22H2)<br/>- Administrative Templates (.admx) for Windows 11 October 2021 Update (21H2)|
68+
|Scan packed executables<br/>**Scan** \> **Scan packed executables**|Enabled|Not available <br/><br/>Scan packed executables were removed from the following templates:<br/>- Administrative Templates (.admx) for Windows 11 2023 Update (23H2)<br/>- Administrative Templates (.admx) for Windows 11 2022 Update (22H2) - v3.0 <br/>- Administrative Templates (.admx) for Windows 11 2022 Update (22H2)<br/>- Administrative Templates (.admx) for Windows 11 October 2021 Update (21H2)|
7269
|Scan removable drives during full scans only<br/>**Scan** \> **Scan removable drives**|Disabled|`-DisableRemovableDriveScanning`|
7370
|Specify the level of subfolders within an archive folder to scan <p>**Scan** \> **Specify the maximum depth to scan archive files**|0|Not available|
7471
|Specify the maximum CPU load (as a percentage) during a scan. <p> **Scan** \> **Specify the maximum percentage of CPU utilization during a scan**|50|`-ScanAvgCPULoadFactor`<br/><br/> The maximum CPU load is not a hard limit, but is guidance for the scanning engine to not exceed the maximum on average. Manual scans ignore this setting and run without any CPU limits.|
@@ -93,11 +90,11 @@ See [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/wi
9390

9491
Email scanning enables scanning of email files used by Outlook and other mail clients during on-demand and scheduled scans. Embedded objects within email (such as attachments and archived files) are also scanned. The following file format types can be scanned and remediated:
9592

96-
- DBX
97-
- MBX
98-
- MIME
93+
- `DBX`
94+
- `MBX`
95+
- `MIME`
9996

100-
PST files used by Outlook 2003 or older (where the archive type is set to non-unicode) are also scanned, but Microsoft Defender Antivirus cannot remediate threats that are detected inside PST files.
97+
`PST` files used by Outlook 2003 or older (where the archive type is set to non-unicode) are also scanned, but Microsoft Defender Antivirus cannot remediate threats that are detected inside `PST` files.
10198

10299
If Microsoft Defender Antivirus detects a threat inside an email message, the following information is displayed to assist you in identifying the compromised email so you can remediate the threat manually:
103100

defender-endpoint/machine-tags.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: denisebmsft
77
ms.localizationpriority: medium
88
manager: deniseb
99
audience: ITPro
10-
ms.collection:
10+
ms.collection:
1111
- m365-security
1212
- tier2
1313
ms.topic: reference
@@ -32,7 +32,7 @@ ms.date: 02/27/2023
3232
Add tags on devices to create a logical group affiliation. Device tags support proper mapping of the network, enabling you to attach different tags to capture context and to enable dynamic list creation as part of an incident. Tags can be used as a filter in the **Device inventory** view, or to group devices. For more information on device grouping, see [Create and manage device groups](machine-groups.md).
3333

3434
> [!NOTE]
35-
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
35+
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
3636
3737
You can add tags on devices using the following ways:
3838

@@ -62,7 +62,6 @@ To add device tags using API, see [Add or remove device tags API](api/add-or-rem
6262
2. Select **Manage tags** from the row of Response actions.
6363

6464
:::image type="content" source="media/manage-tags-option.png" alt-text="Image of manage tags button" lightbox="media/manage-tags-option.png":::
65-
6665

6766
3. Type to find or create tags
6867

@@ -81,7 +80,7 @@ You can also delete tags from this view.
8180

8281
## Add device tags using dynamic rules for device tagging
8382

84-
You can create and manage rules that automatically assign and remove tags from devices based on user-defined criteria directly in the Microsoft Defender portal. Please refer to following documents for details
83+
You can create and manage rules that automatically assign and remove tags from devices based on user-defined criteria directly in the Microsoft Defender portal. Please refer to following documents for details:
8584

8685
- [Manage your devices with ease using dynamic rules for device tagging in Microsoft Defender](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/manage-your-devices-with-ease-using-dynamic-rules-for-device/ba-p/4024988)
8786
- [Asset rule management - Dynamic rules for devices](/defender-xdr/configure-asset-rules)
@@ -157,8 +156,6 @@ You can use Microsoft Intune to define and apply device tags. You can perform th
157156

158157
- In the [OMA-IRU settings](/mem/intune/configuration/custom-settings-windows-10) section, for **Data type**, choose **String**. For **OMA-URI**, type (or paste) `./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/DeviceTagging/Group`.
159158

160-
161-
162159
## Add device tags by creating app configuration policy in Microsoft Intune
163160

164161
> [!NOTE]

0 commit comments

Comments
 (0)