You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/mde-security-settings-management.md
+75-62Lines changed: 75 additions & 62 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,14 +35,14 @@ ms.custom:
35
35
- macOS
36
36
- Linux
37
37
38
-
Use the Microsoft Defender for Endpoint Security Settings Management to manage Microsoft Defender Antivirus security policies on devices.
38
+
This article describes how to manage Microsoft Defender Antivirus security policies on devices with Defender for Endpoint Security Settings Management (in the [Microsoft Defender portal](https://security.microsoft.com)).
39
39
40
-
### Prerequisites:
40
+
### Prerequisites
41
41
42
42
Review the prerequisites [here](/mem/intune/protect/mde-security-integration).
43
43
44
44
> [!NOTE]
45
-
> The **Endpoint Security Policies** page in the Microsoft Defender portal is available only for [users with the Security Administrator role assigned](assign-portal-access.md). Any other user role, such as Security Reader, can't access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in the scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
45
+
> The **Endpoint Security Policies** page in the Microsoft Defender portal is available only for [users with the Security Administrator role assigned](assign-portal-access.md). Any other user role, such as Security Reader, can't access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in the scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
46
46
47
47
As a security administrator, you can configure different Microsoft Defender Antivirus security policy settings in the [Microsoft Defender portal](https://security.microsoft.com).
48
48
@@ -67,7 +67,7 @@ The following list provides a brief description of each endpoint security policy
67
67
68
68
## Create an endpoint security policy
69
69
70
-
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) using at least a Security Administrator role.
70
+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) using an account with at least the Security Administrator role assigned.
71
71
72
72
2. Select **Endpoints** > **Configuration management** > **Endpoint security policies** and then select **Create new Policy**.
73
73
@@ -130,13 +130,14 @@ During an investigation, you can also view the **Security policies** tab in the
130
130
|Allow On Access Protection|Allowed|
131
131
|PUA Protection|PUA Protection on|
132
132
133
-
For more information, see:
133
+
For more information, see the following articles:
134
+
134
135
-[Advanced technologies at the core of Microsoft Defender Antivirus](/defender-endpoint/adv-tech-of-mdav)
135
136
-[Enable and configure Microsoft Defender Antivirus always-on protection](/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus)
136
137
-[Behavior monitoring in Microsoft Defender Antivirus](/defender-endpoint/behavior-monitor)
137
138
-[Detect and block potentially unwanted applications](/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus)
138
139
139
-
1.**Cloud protection features**:
140
+
**Cloud protection features**:
140
141
141
142
|Description|Setting|
142
143
|---|---|
@@ -168,18 +169,18 @@ For more information, see [Configure Microsoft Defender Antivirus scanning optio
|Signature Update File Shares Sources | Not configured|
173
174
|Metered Connection Updates | Not allowed (default)|
174
175
|Security Intelligence Updates Channel | Not configured|
175
176
176
177
> [!NOTE]
177
-
> Where:
178
-
> 'InternalDefinitionUpdateServer' is WSUS with Microsoft Defender Antivirus updates allowed.
179
-
> 'MicrosoftUpdateServer' is Microsoft Update (formerly Windows Update).
180
-
> 'MMPC' is Microsoft Defender security intelligence center (WDSI formerly Microsoft Malware Protection Center) https://www.microsoft.com/en-us/wdsi/definitions.
178
+
> `InternalDefinitionUpdateServer` is WSUS with Microsoft Defender Antivirus updates allowed.
179
+
> `MicrosoftUpdateServer` is Microsoft Update (formerly Windows Update).
180
+
> `MMPC` is Microsoft Defender security intelligence center (WDSI formerly Microsoft Malware Protection Center) https://www.microsoft.com/en-us/wdsi/definitions.
181
+
182
+
For more information, see the following articles:
181
183
182
-
For more information, see:
183
184
-[Microsoft Defender Antivirus security intelligence and product updates](/defender-endpoint/microsoft-defender-antivirus-updates)
184
185
-[Update channels for security intelligence updates](/defender-endpoint/manage-gradual-rollout)
185
186
@@ -237,7 +238,8 @@ For more information, see [Manage the gradual rollout process for Microsoft Defe
237
238
> In this example, a quick scan runs for Windows clients on Wednesday's at 5:00 PM. (1020).
238
239
> And for Windows Servers, on Saturday's at 1:00 AM. (60)
239
240
240
-
For more information, see:
241
+
For more information, see the following articles:
242
+
241
243
-[Configure scheduled quick or full Microsoft Defender Antivirus scans](/defender-endpoint/schedule-antivirus-scans)
242
244
-[Microsoft Defender Antivirus full scan considerations and best practices](/defender-endpoint/mdav-scan-best-practices)
243
245
@@ -249,31 +251,26 @@ For more information, see:
249
251
|Remediation action for Severe threats|Quarantine|
250
252
|Remediation action for Low severity threats|Quarantine|
251
253
|Remediation action for Moderate severity threats|Quarantine|
252
-
253
-
|Description|Setting|
254
-
|---|---|
255
254
|Days To Retain Cleaned Malware|Configured, 60|
256
-
|Allow User UI Access|Allowed. Let users access UI.|
255
+
|Allow User UI Access|Allowed. Let users access UI.|
257
256
258
257
For more information, see [Configure remediation for Microsoft Defender Antivirus detections](/defender-endpoint/configure-remediation-microsoft-defender-antivirus).
259
258
260
259
**Antivirus exclusions:**
261
260
262
261
***Local administrator merge behavior***:
263
262
264
-
Disable local administrator AV settings such as exclusions, and set the policies from the Microsoft Defender for Endpoint Security Settings Management as described in the following table:
263
+
Disable local administrator antivirus settings, such as exclusions, and set the policies using Defender for Endpoint Security Settings Management, as described in the following table:
265
264
266
265
|Description|Setting|
267
266
|---|---|
268
267
|Disable Local Admin Merge|Disable Local Admin Merge|
269
-
270
-
|Description|Setting|
271
-
|---|---|
272
268
|Excluded Extensions | Add as needed for working around false positives (FPs) and/or troubleshooting high cpu utilizations in MsMpEng.exe |
273
269
|Excluded Paths | Add as needed for working around false positives (FPs) and/or troubleshooting high cpu utilizations in MsMpEng.exe |
274
270
|Excluded Processes | Add as needed for working around false positives (FPs) and/or troubleshooting high cpu utilizations in MsMpEng.exe|
275
271
276
-
For more information, see:
272
+
For more information, see the following articles:
273
+
277
274
-[Prevent or allow users to locally modify Microsoft Defender Antivirus policy settings](/defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus)
278
275
-[Configure custom exclusions for Microsoft Defender Antivirus](/defender-endpoint/configure-exclusions-microsoft-defender-antivirus)
279
276
@@ -302,22 +299,32 @@ For more information, see [Microsoft Defender Core service overview](/defender-e
302
299
For more information, see [Use network protection to help prevent connections to malicious or suspicious sites](/defender-endpoint/network-protection).
303
300
304
301
1. When you're done configuring settings, select **Next**.
302
+
305
303
2. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
304
+
306
305
3. Select **Next**.
306
+
307
307
4. On the **Review + create** tab, review your policy settings, and then select **Save**.
308
308
309
309
### Attack Surface Reduction rules
310
310
311
311
To enable Attack Surface Reduction (ASR) rules using the endpoint security policies, perform the following steps:
312
312
313
313
1. Sign in to [Microsoft Defender XDR](https://sip.security.microsoft.com/).
314
-
1. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
315
-
1. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
316
-
1. Select **Attack Surface Reduction Rules** from the **Select Template** drop-down list.
317
-
1. Select **Create policy**.
318
-
1. On the **Basics** page, enter a name and description for the profile; then, choose **Next**.
319
-
1. On the **Configuration settings** page, expand the groups of settings and configure the settings that you want to manage with this profile.
320
-
1. Set the policies based on the following recommended settings:
314
+
315
+
2. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
316
+
317
+
3. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
318
+
319
+
4. Select **Attack Surface Reduction Rules** from the **Select Template** drop-down list.
320
+
321
+
5. Select **Create policy**.
322
+
323
+
6. On the **Basics** page, enter a name and description for the profile; then, choose **Next**.
324
+
325
+
7. On the **Configuration settings** page, expand the groups of settings and configure the settings that you want to manage with this profile.
326
+
327
+
8. Set the policies based on the following recommended settings:
321
328
322
329
|Description|Setting|
323
330
|---|---|
@@ -342,41 +349,53 @@ To enable Attack Surface Reduction (ASR) rules using the endpoint security polic
342
349
|[PREVIEW] Block rebooting machine in Safe Mode|Block|
343
350
|Enable Controlled Folder Access|Enabled|
344
351
345
-
> [!TIP]
346
-
> Any of the rules might block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named "Attack Surface Reduction Only Exclusions." Additionally, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
352
+
> [!TIP]
353
+
> Any of the rules might block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named "Attack Surface Reduction Only Exclusions." Additionally, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
354
+
355
+
For more information, see [Attack surface reduction rules deployment overview](/defender-endpoint/attack-surface-reduction-rules-deployment).
347
356
348
-
For more information, see [Attack surface reduction rules deployment overview](/defender-endpoint/attack-surface-reduction-rules-deployment).
357
+
9. Select **Next**.
349
358
350
-
1. Select **Next**.
351
-
1. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
352
-
1. Select **Next**.
353
-
1. On the **Review + create** tab, review your policy settings, and then select **Save**.
359
+
10. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
360
+
361
+
11. Select **Next**.
362
+
363
+
12. On the **Review + create** tab, review your policy settings, and then select **Save**.
354
364
355
365
356
366
#### Enable Tamper Protection
357
367
358
368
1. Sign in to [Microsoft Defender XDR](https://sip.security.microsoft.com/).
359
-
1. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
360
-
1. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
361
-
1. Select **Security Experience** from the **Select Template** drop-down list.
362
-
1. Select **Create policy**. The **Create a new policy** page appears.
363
-
1. On the **Basics** page, enter a name and description for the profile in the **Name** and **Description** fields, respectively.
364
-
1. Select **Next**.
365
-
1. On the **Configuration settings** page, expand the groups of settings.
366
-
1. From these groups, select the settings that you want to manage with this profile.
367
-
1. Set the policies for the chosen groups of settings by configuring them as described in the following table:
369
+
370
+
2. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
371
+
372
+
3. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
373
+
374
+
4. Select **Security Experience** from the **Select Template** drop-down list.
375
+
376
+
5. Select **Create policy**. The **Create a new policy** page appears.
377
+
378
+
6. On the **Basics** page, enter a name and description for the profile in the **Name** and **Description** fields, respectively.
379
+
380
+
7. Select **Next**.
381
+
382
+
8. On the **Configuration settings** page, expand the groups of settings.
383
+
384
+
9. From these groups, select the settings that you want to manage with this profile.
385
+
386
+
10. Set the policies for the chosen groups of settings by configuring them as described in the following table:
368
387
369
388
|Description| Setting|
370
389
| -------- | -------- |
371
390
| TamperProtection (Device) | On|
372
391
373
-
For more information, see [Protect security settings with tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
392
+
For more information, see [Protect security settings with tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
374
393
375
394
#### Check the Cloud Protection network connectivity
376
395
377
396
It's important to check that the Cloud Protection network connectivity is working during your penetration testing.
378
397
379
-
CMD (Run as admin)
398
+
Open Command Prompt as an administrator, and then run the following command:
380
399
381
400
```powershell
382
401
cd "C:\Program Files\Windows Defender"
@@ -387,29 +406,29 @@ For more information, see [Use the cmdline tool to validate cloud-delivered prot
387
406
388
407
#### Check the platform update version
389
408
390
-
The latest "Platform Update" version Production channel (GA) is available in [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623+update).
409
+
The latest Platform Update version Production channel (GA) is available in [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623+update).
391
410
392
-
To check which "Platform Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
411
+
To check which Platform Update version you have installed, run the following command in PowerShell using the privileges of an administrator:
#### Check the Security Intelligence Update version
399
418
400
-
The latest "Security Intelligence Update" version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
419
+
The latest Security Intelligence Update version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
401
420
402
-
To check which "Security Intelligence Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
421
+
To check which Security Intelligence Update version you have installed, run the following command in PowerShell using the privileges of an administrator:
The latest scan "engine update" version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
429
+
The latest scan engine update version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
411
430
412
-
To check which "Engine Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
431
+
To check which Engine Update version you have installed, run the following command in PowerShell as an administrator:
@@ -419,26 +438,20 @@ If you find that your settings aren't taking effect, you might have a conflict.
419
438
420
439
#### For False Negatives (FNs) submissions
421
440
422
-
To information on how to make False Negatives (FNs) submissions, see:
441
+
To report False Negatives (FNs), see the following articles:
423
442
424
443
-[Submit files in Microsoft Defender for Endpoint](admin-submissions-mde.md) if you have Microsoft XDR, Microsoft Defender for Endpoint P2/P1, or Microsoft Defender for Business.
425
444
-[Submit files for analysis](/unified-secops-platform/submission-guide) if you have Microsoft Defender Antivirus.
445
+
426
446
## **See also**
427
447
428
448
-[Troubleshoot Microsoft Defender Antivirus settings](/defender-endpoint/troubleshoot-settings)
429
-
430
449
-[Troubleshoot Microsoft Defender Antivirus Security intelligence not getting updated](/defender-endpoint/troubleshoot-security-intelligence-not-updated)
431
-
432
450
-[Troubleshooting Security Intelligence Updates from Microsoft Update source](/defender-endpoint/security-intelligence-update-tshoot)
0 commit comments