Skip to content

Commit aa1da56

Browse files
authored
Improve formatting and update content in documentation
1 parent a487def commit aa1da56

File tree

1 file changed

+75
-62
lines changed

1 file changed

+75
-62
lines changed

defender-endpoint/mde-security-settings-management.md

Lines changed: 75 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -35,14 +35,14 @@ ms.custom:
3535
- macOS
3636
- Linux
3737

38-
Use the Microsoft Defender for Endpoint Security Settings Management to manage Microsoft Defender Antivirus security policies on devices.
38+
This article describes how to manage Microsoft Defender Antivirus security policies on devices with Defender for Endpoint Security Settings Management (in the [Microsoft Defender portal](https://security.microsoft.com)).
3939

40-
### Prerequisites:
40+
### Prerequisites
4141

4242
Review the prerequisites [here](/mem/intune/protect/mde-security-integration).
4343

4444
> [!NOTE]
45-
> The **Endpoint Security Policies** page in the Microsoft Defender portal is available only for [users with the Security Administrator role assigned](assign-portal-access.md). Any other user role, such as Security Reader, can't access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in the scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
45+
> The **Endpoint Security Policies** page in the Microsoft Defender portal is available only for [users with the Security Administrator role assigned](assign-portal-access.md). Any other user role, such as Security Reader, can't access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in the scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
4646
4747
As a security administrator, you can configure different Microsoft Defender Antivirus security policy settings in the [Microsoft Defender portal](https://security.microsoft.com).
4848

@@ -67,7 +67,7 @@ The following list provides a brief description of each endpoint security policy
6767

6868
## Create an endpoint security policy
6969

70-
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) using at least a Security Administrator role.
70+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) using an account with at least the Security Administrator role assigned.
7171

7272
2. Select **Endpoints** > **Configuration management** > **Endpoint security policies** and then select **Create new Policy**.
7373

@@ -130,13 +130,14 @@ During an investigation, you can also view the **Security policies** tab in the
130130
|Allow On Access Protection|Allowed|
131131
|PUA Protection|PUA Protection on|
132132

133-
For more information, see:
133+
For more information, see the following articles:
134+
134135
- [Advanced technologies at the core of Microsoft Defender Antivirus](/defender-endpoint/adv-tech-of-mdav)
135136
- [Enable and configure Microsoft Defender Antivirus always-on protection](/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus)
136137
- [Behavior monitoring in Microsoft Defender Antivirus](/defender-endpoint/behavior-monitor)
137138
- [Detect and block potentially unwanted applications](/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus)
138139

139-
1. **Cloud protection features**:
140+
**Cloud protection features**:
140141

141142
|Description|Setting|
142143
|---|---|
@@ -168,18 +169,18 @@ For more information, see [Configure Microsoft Defender Antivirus scanning optio
168169
|Description|Setting|
169170
|---|---|
170171
|Signature Update Interval|Configured, 4|
171-
|Signature Update Fallback Order| MicrosoftUpdateServer <br/> InternalDefinitionUpdateServer <br/> MMPC <br/>|
172+
|Signature Update Fallback Order| MicrosoftUpdateServer <br/> InternalDefinitionUpdateServer <br/> MMPC|
172173
|Signature Update File Shares Sources | Not configured|
173174
|Metered Connection Updates | Not allowed (default)|
174175
|Security Intelligence Updates Channel | Not configured|
175176

176177
> [!NOTE]
177-
> Where:
178-
> 'InternalDefinitionUpdateServer' is WSUS with Microsoft Defender Antivirus updates allowed.
179-
> 'MicrosoftUpdateServer' is Microsoft Update (formerly Windows Update).
180-
> 'MMPC' is Microsoft Defender security intelligence center (WDSI formerly Microsoft Malware Protection Center) https://www.microsoft.com/en-us/wdsi/definitions.
178+
> `InternalDefinitionUpdateServer` is WSUS with Microsoft Defender Antivirus updates allowed.
179+
> `MicrosoftUpdateServer` is Microsoft Update (formerly Windows Update).
180+
> `MMPC` is Microsoft Defender security intelligence center (WDSI formerly Microsoft Malware Protection Center) https://www.microsoft.com/en-us/wdsi/definitions.
181+
182+
For more information, see the following articles:
181183

182-
For more information, see:
183184
- [Microsoft Defender Antivirus security intelligence and product updates](/defender-endpoint/microsoft-defender-antivirus-updates)
184185
- [Update channels for security intelligence updates](/defender-endpoint/manage-gradual-rollout)
185186

@@ -237,7 +238,8 @@ For more information, see [Manage the gradual rollout process for Microsoft Defe
237238
> In this example, a quick scan runs for Windows clients on Wednesday's at 5:00 PM. (1020).
238239
> And for Windows Servers, on Saturday's at 1:00 AM. (60)
239240
240-
For more information, see:
241+
For more information, see the following articles:
242+
241243
- [Configure scheduled quick or full Microsoft Defender Antivirus scans](/defender-endpoint/schedule-antivirus-scans)
242244
- [Microsoft Defender Antivirus full scan considerations and best practices](/defender-endpoint/mdav-scan-best-practices)
243245

@@ -249,31 +251,26 @@ For more information, see:
249251
|Remediation action for Severe threats|Quarantine|
250252
|Remediation action for Low severity threats|Quarantine|
251253
|Remediation action for Moderate severity threats|Quarantine|
252-
253-
|Description|Setting|
254-
|---|---|
255254
|Days To Retain Cleaned Malware|Configured, 60|
256-
|Allow User UI Access|Allowed. Let users access UI.|
255+
|Allow User UI Access|Allowed. Let users access UI.|
257256

258257
For more information, see [Configure remediation for Microsoft Defender Antivirus detections](/defender-endpoint/configure-remediation-microsoft-defender-antivirus).
259258

260259
**Antivirus exclusions:**
261260

262261
***Local administrator merge behavior***:
263262

264-
Disable local administrator AV settings such as exclusions, and set the policies from the Microsoft Defender for Endpoint Security Settings Management as described in the following table:
263+
Disable local administrator antivirus settings, such as exclusions, and set the policies using Defender for Endpoint Security Settings Management, as described in the following table:
265264

266265
|Description|Setting|
267266
|---|---|
268267
|Disable Local Admin Merge|Disable Local Admin Merge|
269-
270-
|Description|Setting|
271-
|---|---|
272268
|Excluded Extensions | Add as needed for working around false positives (FPs) and/or troubleshooting high cpu utilizations in MsMpEng.exe |
273269
|Excluded Paths | Add as needed for working around false positives (FPs) and/or troubleshooting high cpu utilizations in MsMpEng.exe |
274270
|Excluded Processes | Add as needed for working around false positives (FPs) and/or troubleshooting high cpu utilizations in MsMpEng.exe|
275271

276-
For more information, see:
272+
For more information, see the following articles:
273+
277274
- [Prevent or allow users to locally modify Microsoft Defender Antivirus policy settings](/defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus)
278275
- [Configure custom exclusions for Microsoft Defender Antivirus](/defender-endpoint/configure-exclusions-microsoft-defender-antivirus)
279276

@@ -302,22 +299,32 @@ For more information, see [Microsoft Defender Core service overview](/defender-e
302299
For more information, see [Use network protection to help prevent connections to malicious or suspicious sites](/defender-endpoint/network-protection).
303300

304301
1. When you're done configuring settings, select **Next**.
302+
305303
2. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
304+
306305
3. Select **Next**.
306+
307307
4. On the **Review + create** tab, review your policy settings, and then select **Save**.
308308

309309
### Attack Surface Reduction rules
310310

311311
To enable Attack Surface Reduction (ASR) rules using the endpoint security policies, perform the following steps:
312312

313313
1. Sign in to [Microsoft Defender XDR](https://sip.security.microsoft.com/).
314-
1. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
315-
1. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
316-
1. Select **Attack Surface Reduction Rules** from the **Select Template** drop-down list.
317-
1. Select **Create policy**.
318-
1. On the **Basics** page, enter a name and description for the profile; then, choose **Next**.
319-
1. On the **Configuration settings** page, expand the groups of settings and configure the settings that you want to manage with this profile.
320-
1. Set the policies based on the following recommended settings:
314+
315+
2. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
316+
317+
3. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
318+
319+
4. Select **Attack Surface Reduction Rules** from the **Select Template** drop-down list.
320+
321+
5. Select **Create policy**.
322+
323+
6. On the **Basics** page, enter a name and description for the profile; then, choose **Next**.
324+
325+
7. On the **Configuration settings** page, expand the groups of settings and configure the settings that you want to manage with this profile.
326+
327+
8. Set the policies based on the following recommended settings:
321328

322329
|Description|Setting|
323330
|---|---|
@@ -342,41 +349,53 @@ To enable Attack Surface Reduction (ASR) rules using the endpoint security polic
342349
|[PREVIEW] Block rebooting machine in Safe Mode|Block|
343350
|Enable Controlled Folder Access|Enabled|
344351

345-
> [!TIP]
346-
> Any of the rules might block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named "Attack Surface Reduction Only Exclusions." Additionally, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
352+
> [!TIP]
353+
> Any of the rules might block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named "Attack Surface Reduction Only Exclusions." Additionally, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
354+
355+
For more information, see [Attack surface reduction rules deployment overview](/defender-endpoint/attack-surface-reduction-rules-deployment).
347356

348-
For more information, see [Attack surface reduction rules deployment overview](/defender-endpoint/attack-surface-reduction-rules-deployment).
357+
9. Select **Next**.
349358

350-
1. Select **Next**.
351-
1. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
352-
1. Select **Next**.
353-
1. On the **Review + create** tab, review your policy settings, and then select **Save**.
359+
10. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
360+
361+
11. Select **Next**.
362+
363+
12. On the **Review + create** tab, review your policy settings, and then select **Save**.
354364

355365

356366
#### Enable Tamper Protection
357367

358368
1. Sign in to [Microsoft Defender XDR](https://sip.security.microsoft.com/).
359-
1. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
360-
1. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
361-
1. Select **Security Experience** from the **Select Template** drop-down list.
362-
1. Select **Create policy**. The **Create a new policy** page appears.
363-
1. On the **Basics** page, enter a name and description for the profile in the **Name** and **Description** fields, respectively.
364-
1. Select **Next**.
365-
1. On the **Configuration settings** page, expand the groups of settings.
366-
1. From these groups, select the settings that you want to manage with this profile.
367-
1. Set the policies for the chosen groups of settings by configuring them as described in the following table:
369+
370+
2. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
371+
372+
3. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
373+
374+
4. Select **Security Experience** from the **Select Template** drop-down list.
375+
376+
5. Select **Create policy**. The **Create a new policy** page appears.
377+
378+
6. On the **Basics** page, enter a name and description for the profile in the **Name** and **Description** fields, respectively.
379+
380+
7. Select **Next**.
381+
382+
8. On the **Configuration settings** page, expand the groups of settings.
383+
384+
9. From these groups, select the settings that you want to manage with this profile.
385+
386+
10. Set the policies for the chosen groups of settings by configuring them as described in the following table:
368387

369388
|Description| Setting|
370389
| -------- | -------- |
371390
| TamperProtection (Device) | On|
372391

373-
For more information, see [Protect security settings with tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
392+
For more information, see [Protect security settings with tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
374393

375394
#### Check the Cloud Protection network connectivity
376395

377396
It's important to check that the Cloud Protection network connectivity is working during your penetration testing.
378397

379-
CMD (Run as admin)
398+
Open Command Prompt as an administrator, and then run the following command:
380399

381400
```powershell
382401
cd "C:\Program Files\Windows Defender"
@@ -387,29 +406,29 @@ For more information, see [Use the cmdline tool to validate cloud-delivered prot
387406

388407
#### Check the platform update version
389408

390-
The latest "Platform Update" version Production channel (GA) is available in [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623+update).
409+
The latest Platform Update version Production channel (GA) is available in [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623+update).
391410

392-
To check which "Platform Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
411+
To check which Platform Update version you have installed, run the following command in PowerShell using the privileges of an administrator:
393412

394413
```powershell
395414
Get-MPComputerStatus | Format-Table AMProductVersion
396415
```
397416

398417
#### Check the Security Intelligence Update version
399418

400-
The latest "Security Intelligence Update" version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
419+
The latest Security Intelligence Update version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
401420

402-
To check which "Security Intelligence Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
421+
To check which Security Intelligence Update version you have installed, run the following command in PowerShell using the privileges of an administrator:
403422

404423
```powershell
405424
Get-MPComputerStatus | Format-Table AntivirusSignatureVersion
406425
```
407426

408427
#### Check the Engine Update version
409428

410-
The latest scan "engine update" version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
429+
The latest scan engine update version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
411430

412-
To check which "Engine Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
431+
To check which Engine Update version you have installed, run the following command in PowerShell as an administrator:
413432

414433
```powershell
415434
Get-MPComputerStatus | Format-Table AMEngineVersion
@@ -419,26 +438,20 @@ If you find that your settings aren't taking effect, you might have a conflict.
419438

420439
#### For False Negatives (FNs) submissions
421440

422-
To information on how to make False Negatives (FNs) submissions, see:
441+
To report False Negatives (FNs), see the following articles:
423442

424443
- [Submit files in Microsoft Defender for Endpoint](admin-submissions-mde.md) if you have Microsoft XDR, Microsoft Defender for Endpoint P2/P1, or Microsoft Defender for Business.
425444
- [Submit files for analysis](/unified-secops-platform/submission-guide) if you have Microsoft Defender Antivirus.
445+
426446
## **See also**
427447

428448
- [Troubleshoot Microsoft Defender Antivirus settings](/defender-endpoint/troubleshoot-settings)
429-
430449
- [Troubleshoot Microsoft Defender Antivirus Security intelligence not getting updated](/defender-endpoint/troubleshoot-security-intelligence-not-updated)
431-
432450
- [Troubleshooting Security Intelligence Updates from Microsoft Update source](/defender-endpoint/security-intelligence-update-tshoot)
433-
434451
- [Troubleshoot attack surface reduction rules](/defender-endpoint/troubleshoot-asr)
435-
436452
- [Troubleshoot network protection](/defender-endpoint/troubleshoot-np)
437-
438453
- [Troubleshoot problems with tamper protection](/defender-endpoint/troubleshoot-problems-with-tamper-protection)
439-
440454
- [Troubleshoot performance issues related to real-time protection](/defender-endpoint/troubleshoot-performance-issues)
441-
442455
- [Run the client analyzer on Windows](/defender-endpoint/run-analyzer-windows)
443-
444456
- [Performance analyzer for Microsoft Defender Antivirus](/defender-endpoint/tune-performance-defender-antivirus)
457+

0 commit comments

Comments
 (0)