Skip to content

Commit b1b668c

Browse files
committed
Learn Editor: Update detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md
1 parent 33167d7 commit b1b668c

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -106,6 +106,12 @@ You can enable PUA protection with Microsoft Defender for Endpoint Security Sett
106106

107107
At first, try using PUA protection in audit mode. It detects potentially unwanted applications without actually blocking them. Detections are captured in the Windows Event log. PUA protection in audit mode is useful if your company is conducting an internal software security compliance check and it's important to avoid false positives.
108108

109+
| Operating systems |Potentially Unwanted Protection (PUA) by default is set to:|
110+
| -------- | -------- |
111+
|Windows 11, Windows 10, Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016|Audit mode (2)|
112+
|Windows 11, Windows 10 + Microsoft Defender for Endpoint Plan 1 or Microsoft Defender for Endpoint Plan 2 or Microsoft Endpoint for Business|Block mode (1)|
113+
|Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2 with the unified Microsoft Defender for Endpoint client + Microsoft Defender for Servers Plan 1 or Microsoft Defender for Servers Plan 2 or Microsoft Defender for Endpoint for servers|Block mode (1) |
114+
109115
### Use Microsoft Defender for Endpoint Security Settings Management to configure PUA protection
110116

111117
See the following articles:

0 commit comments

Comments
 (0)