Skip to content

Commit abb475d

Browse files
committed
Update configure-endpoints-vdi.md
1 parent 4bead5d commit abb475d

File tree

1 file changed

+10
-1
lines changed

1 file changed

+10
-1
lines changed

defender-endpoint/configure-endpoints-vdi.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,14 +125,18 @@ The following registry is relevant only when the aim is to achieve a single entr
125125
1. Set the registry value as follows:
126126

127127
```console
128+
128129
[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection\DeviceTagging]
129130
"VDI"="NonPersistent"
131+
130132
```
131133

132134
Or, you can use command line as follows:
133135

134136
```console
137+
135138
reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection\DeviceTagging" /v VDI /t REG_SZ /d "NonPersistent" /f
139+
136140
```
137141

138142
2. Follow the [server onboarding process](configure-server-endpoints.md).
@@ -144,20 +148,25 @@ With the ability to easily deploy updates to VMs running in VDIs, we've shortene
144148
If you have onboarded the primary image of your VDI environment (SENSE service is running), then you must offboard and clear some data before putting the image back into production.
145149

146150
1. [Offboard the machine](offboard-machines.md).
151+
147152
2. Ensure the sensor is stopped by running the following command in a CMD window:
148153

149154
```console
155+
150156
sc query sense
157+
151158
```
152159

153160
3. Run the following commands in a CMD window::
154161

155162
```console
163+
156164
del "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Cyber\*.*" /f /s /q
157165
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection" /v senseGuid /f
158166
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection" /v 7DC0B629-D7F6-4DB3-9BF7-64D5AAF50F1A /f
159167
REG DELETE "HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\48A68F11-7A16-4180-B32C-7F974C7BD783" /f
160168
exit
169+
161170
```
162171

163172
### Are you using a third party for VDIs?
@@ -176,7 +185,7 @@ After onboarding devices to the service, it's important to take advantage of the
176185

177186
The configuration settings in this link are recommended: [Configure Microsoft Defender Antivirus on a remote desktop or virtual desktop infrastructure environment](/defender-endpoint/deployment-vdi-microsoft-defender-antivirus).
178187

179-
## Related topics
188+
## Related articles
180189

181190
- [Onboard Windows devices using Group Policy](configure-endpoints-gp.md)
182191
- [Onboard Windows devices using Microsoft Configuration Manager](configure-endpoints-sccm.md)

0 commit comments

Comments
 (0)