Skip to content

Commit b921b22

Browse files
committed
Update use-group-policy-microsoft-defender-antivirus.md
1 parent a5f3c76 commit b921b22

File tree

1 file changed

+2
-3
lines changed

1 file changed

+2
-3
lines changed

defender-endpoint/use-group-policy-microsoft-defender-antivirus.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
author: emmwalshh
77
ms.author: ewalsh
88
ms.custom: nextgen
9-
ms.date: 04/10/2025
9+
ms.date: 04/11/2025
1010
ms.reviewer: ksarens, jtoole, pahuijbr, yongrhee
1111
manager: deniseb
1212
ms.subservice: ngp
@@ -23,7 +23,6 @@ search.appverid: met150
2323

2424
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2525

26-
2726
**Applies to:**
2827

2928
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
@@ -84,7 +83,7 @@ The following table lists commonly used Group Policy settings that are available
8483
| MAPS | Configure local setting override for reporting to Microsoft MAPS| [Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md) |
8584
| MpEngine | Configure extended cloud check| [Configure the cloud block time-out period](configure-cloud-block-timeout-period-microsoft-defender-antivirus.md) |
8685
| MpEngine | Disable gradual rollout of Microsoft Defender updates | [Configure updates: Group Policy](configure-updates.md#group-policy) |
87-
| MpEngine | Enable file hash computation feature |[Create indicators for files](/defender-endpoint/indicator-file#windows-prerequisites)<br>This drives the ability to enforce Indicators of Compromise (IoC) via Indicators - File hash - allow/block which is available with Microsoft Defender for Endpoint Plan 1 or Microsoft Defender for Endpoint Plan 2 or Microsoft Defender for Business. Note: Defender Antivirus automatically does hash-based computation for the antimalware engine, thus you do not have to do anything extra unless it is a VDI non-persistent image as documented [here](/defender-endpoint/deployment-vdi-microsoft-defender-antivirus). |
86+
| MpEngine | Enable file hash computation feature |[Create indicators for files](/defender-endpoint/indicator-file#windows-prerequisites)<br/>This drives the ability to enforce Indicators of Compromise (IoC) by using file hash allow/block indicators, available in Defender for Endpoint Plan 1 and Plan 2, and in Defender for Business. Note that Microsoft Defender Antivirus automatically does hash-based computation for the antimalware engine, so you don't have to do anything extra unless it is a [VDI non-persistent image](/defender-endpoint/deployment-vdi-microsoft-defender-antivirus). |
8887
| MpEngine | Select cloud protection level | [Specify the cloud-delivered protection level](specify-cloud-protection-level-microsoft-defender-antivirus.md) |
8988
| Network inspection system | Convert warn verdict to block | [Network protection: Warn experience](network-protection.md#warn-experience) |
9089
| Network inspection system | Specify more definition sets for network traffic inspection | Not used (deprecated) |

0 commit comments

Comments
 (0)