You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/troubleshoot-mdav-scan-issues.md
+16-2Lines changed: 16 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.collection:
13
13
ms.topic: troubleshooting
14
14
ms.subservice: ngp
15
15
search.appverid: met150
16
-
ms.date: 03/11/2025
16
+
ms.date: 04/29/2025
17
17
---
18
18
19
19
# Troubleshoot Microsoft Defender Antivirus scan issues
@@ -34,6 +34,20 @@ Understanding why a scan is launched can help identify what settings are applied
34
34
| Catch up scan | Launched when a scheduled scan was missed twice |
35
35
| Manually launched | A scan is launched manually by using any of the following methods: <br/>- Command Prompt: `MpCmdRun -scan -scantype` <br/>- [Taking a response action on a device](/defender-endpoint/respond-machine-alerts#run-microsoft-defender-antivirus-scan-on-devices) in the Microsoft Defender portal <br/>- Using the Windows Security app or Microsoft Defender app on the device |
36
36
37
+
## CPU performance and scan throttling in Microsoft Defender Antivirus
38
+
39
+
Microsoft Defender Antivirus includes several configurable settings to manage CPU usage during scans. These settings help balance system performance and security by controlling how aggressively Defender uses system resources. If you use Group Policy, these settings are found under `Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Scan`. To check current value of these settings on a machine use the `Get-MpPreference` PowerShell command.
40
+
41
+
The key settings to be aware of are listed in the following table:
42
+
43
+
| Setting | Details |
44
+
|--|--|
45
+
|`ScanOnlyIfIdle`|**Description**: When enabled, Microsoft Defender Antivirus only performs scans when the system is idle.<br/><br/>**Purpose**: This minimizes performance impact during active use by deferring scans until the system is not in use.<br/><br/>**Typical Use Case**: Ideal for environments where user experience is a priority and scans can be delayed without compromising security.<br/><br/>**Policy Name**:<br/>**Group Policy**: Not available. <br/>- **Intune**: `./Device/Vendor/MSFT/Defender/Configuration/ScanOnlyIfIdleEnabled` <br/><br/>**Default**: True (Enabled) |
46
+
|`DisableCpuThrottleOnIdleScans`|**Description**: When set to `true`, this disables CPU throttling during idle-time scans.<br/><br/>**Purpose**: Allows Defender to use more CPU resources when the system is idle, potentially completing scans faster.<br/><br/>**Interaction with Other Settings**: Works with `ScanOnlyIfIdle`. If both are enabled, scans run only when idle and aren't throttled.<br/><br/>**Policy Name**:<br/>- **Group Policy**: Not available.<br/>- **Intune**: `./Device/Vendor/MSFT/Defender/Configuration/DisableCpuThrottleOnIdleScans`<br/><br/>**Default**: True (Enabled) |
47
+
|`AvgCPULoadFactor`|**Description**: Specifies the average CPU load (as a percentage) that Microsoft Defender Antivirus shouldn't exceed during scans. This setting doesn't apply to real time protection scans.<br/><br/>**Purpose**: Helps maintain overall system responsiveness by limiting Defender's CPU usage.<br/><br/>**Example**: A value of `50` means Microsoft Defender Antivirus attempts to keep its CPU usage below 50% during scans.<br/><br/>**Interaction with Other Settings**: This setting is influenced by `DisableCpuThrottleOnIdleScans` and `ThrottleForScheduledScanOnly`, which can override or limit when throttling is applied.<br/><br/>**Policy Name**: <br/>- **Group Policy**: `Specify the maximum percentage of CPU utilization during a scan`<br/>- **Intune**: `./Device/Vendor/MSFT/Policy/Config/Defender/AvgCPULoadFactor`|
48
+
|`ThrottleForScheduledScanOnly`|**Description**: When enabled, CPU throttling is applied only to scheduled scans, not to manual scans.<br/><br/>**Purpose**: Ensures that scheduled scans are less intrusive, while allowing manual scans to run at full speed if needed.<br/><br/>**Interaction with Other Settings**: When used with `AvgCPULoadFactor`, throttling limits only apply to scheduled scans. Manual scans ignore the CPU load factor and might use more resources.<br/><br/>**Policy Name**:<br/>- **Group Policy**: `Cpu throttling type` <br/>- **Intune**: `./Device/Vendor/MSFT/Policy/Config/Defender/ThrottleForScheduledScanOnly`<br/><br/>**Default**: True (Enabled) |
49
+
|`EnableLowCpuPriority`|**Description**: This policy setting allows you to enable or disable low CPU priority for scheduled scans.<br/><br/>**Purpose**: Helps reduce the impact of scans on system performance by allowing other processes to take precedence over Microsoft Defender Antivirus's scanning tasks.<br/><br/>**Interaction with Other Settings**: Complements `AvgCPULoadFactor` and `ThrottleForScheduledScanOnly` by further deprioritizing Microsoft Defender Antivirus's CPU usage. It's especially useful in environments where maintaining responsiveness during scans is critical.<br/><br/>**Policy Name**: <br/>- **Group Policy**: `Configure low CPU priority for scheduled scans`<br/>- **Intune**: `./Device/Vendor/MSFT/Policy/Config/Defender/EnableLowCPUPriority`<br/><br/>**Default**: False (Disabled) |
50
+
37
51
## Policies that impact scanning
38
52
39
53
Understanding the policies applied to the scan enables you to understand the behavior of the scan and what can be tuned to remediate scan challenges.
@@ -73,7 +87,7 @@ In an Intune policy and in [Defender for Endpoint Security Settings Management](
73
87
74
88
Settings: `Scan Parameter`; `Schedule Scan Day`; and `Schedule Scan Time`
75
89
76
-
If you are using Group Policy to manage your devices, see [Configure Microsoft Defender Antivirus with Group Policy](/defender-endpoint/use-group-policy-microsoft-defender-antivirus#group-policy-settings-and-resources)
90
+
If you're using Group Policy to manage your devices, see [Configure Microsoft Defender Antivirus with Group Policy](/defender-endpoint/use-group-policy-microsoft-defender-antivirus#group-policy-settings-and-resources)
77
91
78
92
For information about troubleshooting antivirus settings, see [Troubleshoot Microsoft Defender Antivirus settings](/defender-endpoint/troubleshoot-settings)
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-security-recommendation.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- Tier1
13
13
ms.topic: concept-article
14
14
search.appverid: met150
15
-
ms.date: 03/04/2025
15
+
ms.date: 04/28/2025
16
16
#customer intent: Get information on how to view and act on security recommendations in Microsoft Defender Vulnerability Management.
17
17
---
18
18
@@ -73,15 +73,15 @@ The color of the **Exposed devices** graph changes as the trend changes. If the
73
73
> [!NOTE]
74
74
> Vulnerability management shows devices that were in use within the last 30 days. This is different from device status in Defender for Endpoint, where if a device has `Inactive` status if it doesn't communicate with the service for more than seven days.
75
75
76
-
:::image type="content" alt-text="Screenshot of the security recommendations landing page." source="/defender/media/defender-vulnerability-management/tvm-sec-reco-expanded-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sec-reco-expanded.png":::
76
+
:::image type="content" source="media/tvm-sec-reco-expanded-small.png" alt-text="Screenshot of security recommendations." lightbox="media/tvm-sec-reco-expanded.png":::
77
77
78
78
### Icons
79
79
80
80
Useful icons also quickly call your attention to:
81
81
82
-
- possible active alerts
83
-
- associated public exploits
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-software-inventory.md
+35-29Lines changed: 35 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- Tier1
13
13
ms.topic: concept-article
14
14
search.appverid: met150
15
-
ms.date: 03/05/2025
15
+
ms.date: 04/29/2025
16
16
#customer intent: To learn about the software inventory page in Microsoft Defender for Endpoint's Vulnerability Management.
17
17
---
18
18
@@ -36,20 +36,18 @@ You can remove the **CPE Available** filter to gain further visibility and incre
36
36
37
37
In the field of discovery, we're using the same set of signals that is responsible for detection and vulnerability assessment in [Microsoft Defender for Endpoint detection and response capabilities](/defender-endpoint/overview-endpoint-detection-response).
38
38
39
-
Since it's real time, in a matter of minutes, you see vulnerability information as they get discovered. The engine automatically grabs information from multiple security feeds. In fact, you see if a particular software is connected to a live threat campaign. It also provides a link to a Threat Analytics report soon as it's available.
39
+
Since it's real time, in a matter of minutes, you see vulnerability information as it's discovered. The engine automatically grabs information from multiple security feeds. In fact, you see if a particular software is connected to a live threat campaign. It also provides a link to a Threat Analytics report soon as it's available.
40
40
41
41
## Navigate to the Software inventory page
42
42
43
-
Access the software inventory page by signing in to the [Microsoft Defender portal](https://security.microsoft.com) and navigating to **Endpoints** > **Vulnerability management** > **Inventories**, which opens to the **Software** tab.
43
+
In the [Microsoft Defender portal](https://security.microsoft.com), in the navigation pane, go to **Endpoints** > **Vulnerability management** > **Inventories**, and then select the **Software** tab.
44
44
45
45
> [!NOTE]
46
-
> If you search for software using the the Microsoft Defender portal global search, make sure to put an underscore instead of a space. For example, for the best search results you'd write `windows_10` or `windows_11` instead of `Windows 10` or `Windows 11`.
46
+
> If you search for software using the Microsoft Defender portal global search, make sure to put an underscore instead of a space. For example, for the best search results you'd write `windows_10` or `windows_11` instead of `Windows 10` or `Windows 11`.
47
47
48
48
## Software inventory overview
49
49
50
-
The **Software inventory** page opens with a list of software installed in your network, including the vendor name, weaknesses found, threats associated with them, exposed devices, impact to exposure score, and tags.
51
-
52
-
The data is updated every three to four hours. There's currently no way to force a sync.
50
+
The **Software inventory** lists software installed in your network, including the vendor name, weaknesses found, threats associated with them, exposed devices, impact to exposure score, and tags. The data is updated every three to four hours. There's currently no way to force a sync.
53
51
54
52
:::image type="content" alt-text="Example of the landing page for software inventory." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main.png":::
55
53
@@ -74,7 +72,7 @@ Here's how to tell whether software isn't supported:
74
72
75
73
## Software inventory on devices
76
74
77
-
1.Sign in to the Microsoft Defender portal. Navigate to **Assets** > **Devices** to open the **Device inventory** page.
75
+
1.In the [Microsoft Defender portal](https://security.microsoft.com), go to **Assets** > **Devices** to open the **Device inventory** page.
78
76
79
77
2. Select the name of a device to open its device page.
80
78
@@ -86,45 +84,53 @@ Software might be visible at the device level, even if it's currently not suppor
86
84
87
85
### Software evidence
88
86
89
-
See evidence of where we detected a specific software on a device from the registry, disk, or both. You can find it on any device in the device software inventory.
87
+
See evidence of where specific software was detected a device in the registry, on the disk, or both. You can find this information on any device in the device software inventory.
90
88
91
-
Select a software name to open the flyout, and look for the section called **Software Evidence**.
89
+
Select a software name to open its flyout, and look for the section called **Software Evidence**.
92
90
93
91
:::image type="content" alt-text="Software evidence example of Microsoft Edge showing evidence registry path as seen on a device page" source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-evidence-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-evidence.png":::
94
92
95
93
## Software pages
96
94
97
-
You can view software pages a few different ways:
95
+
You can view software pages in the [Microsoft Defender portal](https://security.microosft.com)a few different ways:
98
96
99
-
-**Endpoints** > **Vulnerability management** > **Inventories** > Select a software name > Select **Open software page** in the flyout
100
-
-[Security recommendations page](tvm-security-recommendation.md) > Select a recommendation > Select **Open software page** in the flyout
101
-
-[Event timeline page](threat-and-vuln-mgt-event-timeline.md) > Select an event > Select the hyperlinked software name (like Visual Studio 2017) in the **Related component** section in the flyout
97
+
-Go to **Endpoints** > **Vulnerability management** > **Inventories**, and select the **Software** tab. Select a software name, and then, in the flyout, select **Open software page**.
98
+
-Go to **Endpoints** > **Vulnerability management** > **Recommendations**. Select a recommendation, and in the flyout, select **Open software page**. (See [Security recommendations page](tvm-security-recommendation.md).)
99
+
-Go to **Endpoints** > **Vulnerability management** > **Event timeline**. Select an event, and then, in the **Related components** section, select the link for the software name. (See [Event timeline page](threat-and-vuln-mgt-event-timeline.md).)
102
100
103
-
A full page appears with all the details of a specific software and the following information:
101
+
The software page provides details about specific software with the following information:
104
102
105
103
- Overview with vendor information, exploits available, and impact rating
106
104
- Data visualizations showing the number of and severity of discovered weaknesses, exposed devices, software's usage in the past 30 days, and the top events in the last seven days.
107
-
- Tabs showing information such as:
108
-
- Corresponding security recommendations for the weaknesses and vulnerabilities identified.
109
-
- Named CVEs of discovered vulnerabilities.
110
-
- Devices that have the software installed (along with device name, domain, OS, and more).
111
-
- Software version list (including number of devices the version is installed on, the number of discovered vulnerabilities, and the names of the installed devices).
112
-
- Event timeline
113
-
- Browser extensions (if applicable)
105
+
- Tabs showing information, such as:
106
+
- Corresponding security recommendations for the weaknesses and vulnerabilities identified.
107
+
- Named CVEs of discovered vulnerabilities.
108
+
- Devices that have the software installed (along with device name, domain, OS, and more).
109
+
- Software version list (including number of devices the version is installed on, the number of discovered vulnerabilities, and the names of the installed devices).
110
+
- Event timeline
111
+
- Browser extensions (if applicable)
112
+
113
+
:::image type="content" alt-text="Software example page for Microsoft Edge with the software details, weaknesses, exposed devices, and more." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage.png":::
114
+
115
+
## Normalized software versions
114
116
115
-
:::image type="content" alt-text="Software example page for Microsoft Edge with the software details, weaknesses, exposed devices, and more." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage.png":::
117
+
For some software, normalized versions might be displayed in the Microsoft Defender portal. For example, suppose a device has [SQL Server 2016, version 13.0.7016.1](/troubleshoot/sql/releases/download-and-install-latest-updates#sql-server-2016) installed. However, in the [Microsoft Defender portal](https://security.microsoft.com), SQL Server 2016 is listed as `13.3.7016.1`, a normalized version of SQL Server. In this case, `13.3.7016.1` is functionally equivalent to `13.0.7016.1`.
118
+
119
+
Defender Vulnerability Management applies version normalization rules to ensure better cross-device correlation and more accurate vulnerability assessments. Version normalization is intentional and valid, and is used consistently to streamline detection logic and align with internal data models.
116
120
117
121
## Report inaccuracy
118
122
119
123
Report an inaccuracy when you see vulnerability information and assessment results that are incorrect.
120
124
121
-
1. Open the software flyout on the Software inventory page.
122
-
2. Select **Report inaccuracy**.
123
-
3. From the flyout pane, choose an issue to report from:
125
+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Endpoints** > **Vulnerability management** > **Inventories**, and select the **Software** tab.
126
+
127
+
2. Select a software name to open its flyout, and then select **Report inaccuracy**.
128
+
129
+
3. From the flyout pane, choose an issue. Examples include:
124
130
125
-
- a software detail is wrong
126
-
- the software isn't installed on any device in my org
127
-
- the number of installed or exposed devices is wrong
131
+
- A software detail is wrong
132
+
- The software isn't installed on any device in my org
133
+
- The number of installed or exposed devices is wrong
128
134
129
135
4. Fill in the requested details about the inaccuracy.
0 commit comments