You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/use-group-policy-microsoft-defender-antivirus.md
+14-19Lines changed: 14 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,16 +36,16 @@ search.appverid: met150
36
36
We recommend using [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) to manage Microsoft Defender Antivirus settings for your organization. However, you can use [Group Policy](/windows/win32/srvnodes/group-policy) to configure and manage some settings for Microsoft Defender Antivirus.
37
37
38
38
> [!IMPORTANT]
39
-
> If [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) is enabled in your organization, any changes made to [tamper-protected settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on) are ignored. In addition, you cannot turn off tamper protection by using Group Policy.
39
+
> If [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) is enabled in your organization, any changes made to [tamper-protected settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on) are ignored. In addition, you can't turn off tamper protection by using Group Policy.
40
40
>
41
-
> If you must make changes to a device and those changes are blocked by tamper protection, we recommend using [troubleshooting mode](enable-troubleshooting-mode.md) to temporarily disable tamper protection on the device. Note that after troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.
41
+
> If you must make changes to a device and those changes are blocked by tamper protection, we recommend using [troubleshooting mode](enable-troubleshooting-mode.md) to temporarily disable tamper protection on the device. After troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.
42
42
>
43
43
44
44
## Configure Microsoft Defender Antivirus using Group Policy
45
45
46
46
In general, you can use the following procedure to configure or change some settings for Microsoft Defender Antivirus.
47
47
48
-
1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object (GPO) you want to configure and select **Edit**.
48
+
1. On your Group Policy management machine, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)). Right-click the Group Policy Object (GPO) you want to configure and select **Edit**.
49
49
50
50
2. Using the **Group Policy Management Editor** go to **Computer configuration**.
51
51
@@ -81,7 +81,7 @@ The following table lists commonly used Group Policy settings that are available
81
81
|MAPS|Join Microsoft MAPS|[Enable cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md)|
82
82
|MAPS|Send file samples when further analysis is required|[Enable cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md)|
83
83
|MAPS|Configure local setting override for reporting to Microsoft MAPS|[Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)|
84
-
|MpEngine|Configure extended cloud check|[Configure the cloud block timeout period](configure-cloud-block-timeout-period-microsoft-defender-antivirus.md)|
84
+
|MpEngine|Configure extended cloud check|[Configure the cloud block time-out period](configure-cloud-block-timeout-period-microsoft-defender-antivirus.md)|
85
85
| MpEngine | Disable gradual rollout of Microsoft Defender updates |[Configure updates: Group Policy](configure-updates.md#group-policy)|[Create indicators for files](indicator-file.md)|
|MpEngine|Select cloud protection level|[Specify the cloud-delivered protection level](specify-cloud-protection-level-microsoft-defender-antivirus.md)|
@@ -112,7 +112,7 @@ The following table lists commonly used Group Policy settings that are available
112
112
|Remediation|Specify the time of day to run a scheduled full scan to complete remediation|[Configure scheduled Microsoft Defender Antivirus scans](schedule-antivirus-scans.md)|
113
113
| Reporting | Configure time interval for service health reports |[Configure Microsoft Defender Antivirus notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md)|
114
114
| Reporting | Configure time out for detections in critically failed state |[Configure Microsoft Defender Antivirus notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md)|
115
-
| Reporting | Configure time out for detections in non-critical failed state |[Configure Microsoft Defender Antivirus notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md)|
115
+
| Reporting | Configure time out for detections in noncritical failed state |[Configure Microsoft Defender Antivirus notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md)|
116
116
| Reporting | Configure time out for detections in recently remediated state |[Configure Microsoft Defender Antivirus notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md)|
117
117
| Reporting | Configure time out for detections in requiring additional action |[Configure Microsoft Defender Antivirus notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md)|
118
118
| Reporting | Configure Watson events |[Configure Microsoft Defender Antivirus notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md)|
@@ -126,8 +126,8 @@ The following table lists commonly used Group Policy settings that are available
126
126
|Root|Define proxy server for connecting to the network|[Configure device proxy and Internet connectivity settings](configure-proxy-internet.md#configure-a-static-proxy-for-microsoft-defender-antivirus)|
127
127
| Root | Define the directory path to copy support log files |
128
128
|Root|Configure local administrator merge behavior for lists|[Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)|
129
-
|Root|Allow antimalware service to start up with normal priority|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
130
-
|Root|Allow antimalware service to remain running always|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
129
+
|Root|Allow anti-malware service to start up with normal priority|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
130
+
|Root|Allow anti-malware service to remain running always|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
131
131
|Root|Turn off routine remediation|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
132
132
|Root|Randomize scheduled task times|[Configure scheduled scans for Microsoft Defender Antivirus](schedule-antivirus-scans.md)|
133
133
| Root | Select the channel for Microsoft Defender daily security intelligence updates |[Update channels for security intelligence updates](manage-gradual-rollout.md#update-channels-for-security-intelligence-updates)|
@@ -184,22 +184,12 @@ The following table lists commonly used Group Policy settings that are available
184
184
|Security intelligence updates|Specify the interval to check for security intelligence updates|[Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md)|
185
185
|Security intelligence updates|Specify the time to check for security intelligence updates|[Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md)|
186
186
|Security intelligence updates|Turn on scan after Security intelligence update|[Configure scheduled scans for Microsoft Defender Antivirus](schedule-antivirus-scans.md)|
187
-
|Threats|Specify threat alert levels at which default action should not be taken when detected|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
188
-
|Threats|Specify threats upon which default action should not be taken when detected|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
187
+
|Threats|Specify threat alert levels at which default action shouldn't be taken when detected|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
188
+
|Threats|Specify threats upon which default action shouldn't be taken when detected|[Configure remediation for Microsoft Defender Antivirus scans](configure-remediation-microsoft-defender-antivirus.md)|
189
189
190
190
> [!TIP]
191
191
> Instead of using "Run full scan on mapped network drives", if you have a Network-Attached Storage (NAS) or Storage Area Network (SAN), you can use Internet Content Adaption Protocol (ICAP) scanning with the Microsoft Defender Antivirus engine. For more information, see **[Tech Community Blog: MetaDefender ICAP with Windows Defender Antivirus: World-class security for hybrid environments](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/metadefender-icap-with-windows-defender-antivirus-world-class/ba-p/800234)**.
192
192
193
-
> [!TIP]
194
-
> If you're looking for Antivirus related information for other platforms, see:
195
-
> -[Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
196
-
> -[Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
197
-
> -[macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
198
-
> -[Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
199
-
> -[Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
200
-
> -[Configure Defender for Endpoint on Android features](android-configure.md)
201
-
> -[Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
202
-
203
193
> [!TIP]
204
194
> **Performance tip** Due to a variety of factors (examples listed below) Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues; some examples are:
205
195
>
@@ -222,5 +212,10 @@ The following table lists commonly used Group Policy settings that are available
222
212
-[Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)
223
213
-[Reference topics for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)
224
214
-[Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-windows.md)
215
+
-[Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
216
+
-[Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
217
+
-[Configure Defender for Endpoint on Android features](android-configure.md)
218
+
-[Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
219
+
225
220
226
221
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments