Skip to content

Commit ce51b1d

Browse files
authored
Merge branch 'main' into M1_changes
2 parents bfd396f + 277fd42 commit ce51b1d

7 files changed

+73
-55
lines changed

.github/workflows/AutoPublish.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,8 @@ permissions:
77

88
on:
99
schedule:
10-
- cron: "25 2,5,8,11,14,17,20,22 * * *" # Times are UTC based on Daylight Saving Time. Need to be adjusted for Standard Time. Scheduling at :25 to account for queuing lag.
10+
# - cron: "25 2,5,8,11,14,17,20,22 * * *" # Times are UTC based on Daylight Saving Time (~Mar-Nov). Scheduling at :25 to account for queuing lag.
11+
- cron: "25 3,6,9,12,15,18,21,23 * * *" # Times are UTC based on Standard Time (~Nov-Mar). Scheduling at :25 to account for queuing lag.
1112

1213
workflow_dispatch:
1314

defender-endpoint/defender-endpoint-demonstration-network-protection.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Microsoft Defender for Endpoint Network protection demonstrations
3-
description: Shows how Network protection prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
3+
description: Shows how Network protection prevents employees from using any application to access dangerous domains that might host phishing scams, exploits, and other malicious content on the Internet.
44
search.appverid: met150
55
ms.service: defender-endpoint
66
ms.author: bagol
@@ -24,7 +24,7 @@ appliesto:
2424
---
2525
# Network protection demonstrations
2626

27-
Network Protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
27+
Network Protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that might host phishing scams, exploits, and other malicious content on the Internet.
2828

2929
## Prerequisites
3030

@@ -34,27 +34,27 @@ Network Protection helps reduce the attack surface of your devices from Internet
3434

3535
## Windows
3636

37-
PowerShell command
37+
Run the following PowerShell command:
3838

3939
```powershell
4040
Set-MpPreference -EnableNetworkProtection Enabled
4141
```
4242

43-
Rule states
43+
Following are the Rule states:
4444

4545
|State | Mode| Numeric value |
4646
|:---|:---|:---|
4747
| Disabled | = Off | 0 |
4848
| Enabled | = Block mode | 1 |
4949
| Audit | = Audit mode | 2 |
5050

51-
Verify configuration
51+
Verify the configuration using the following PowerShell command:
5252

5353
```powershell
5454
Get-MpPreference
5555
```
5656

57-
Scenario
57+
**Consider the following scenario**:
5858

5959
1. Turn on Network Protection using PowerShell command:
6060

@@ -64,11 +64,11 @@ Scenario
6464

6565
2. Using the browser of your choice (not Microsoft Edge*), navigate to the [Network Protection website test](https://smartscreentestratings2.net/). Microsoft Edge has other security measures in place to protect from this vulnerability (SmartScreen).
6666

67-
Expected results
67+
Following are the expected results:
6868

6969
Navigation to the website should be blocked and you should see a **Connection blocked** notification.
7070

71-
Clean-up
71+
Run the following command to Clean-up:
7272

7373
```powershell
7474
Set-MpPreference -EnableNetworkProtection Disabled
@@ -90,27 +90,27 @@ For example, to configure network protection to run in blocking mode, execute th
9090
mdatp config network-protection enforcement-level --value block
9191
```
9292

93-
To confirm that network protection has been started successfully, run the following command from the Terminal, and verify that it prints "started":
93+
To confirm that network protection has started successfully, run the following command from the Terminal, and verify that it prints "started":
9494

9595

9696
```bash
9797
mdatp health --field network_protection_status
9898
```
9999

100-
To test Network Protection on macOS/Linux
100+
To test Network Protection on macOS/Linux:
101101

102-
1. Using the browser of your choice (not Microsoft Edge*), navigate to the [Network Protection website test](https://smartscreentestratings2.net/). Microsoft Edge has other security measures in place to protect from this vulnerability (SmartScreen).
103-
1. or from terminal
102+
1. Using the browser of your choice (not Microsoft Edge), navigate to the [Network Protection website test](https://smartscreentestratings2.net/). Microsoft Edge has other security measures in place to protect from this vulnerability (SmartScreen).
103+
1. Or run the following command from the terminal:
104104

105105
```bash
106106
curl -o ~/Downloads/smartscreentestratings2.net https://smartscreentestratings2.net/
107107
```
108108

109-
Expected results
109+
Following are the expected results:
110110

111111
Navigation to the website should be blocked and you should see a **Connection blocked** notification.
112112

113-
Clean-up
113+
Run the following command to Clean-up:
114114

115115
```bash
116116
mdatp config network-protection enforcement-level --value audit

defender-endpoint/deploy-manage-report-microsoft-defender-antivirus.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Deploy, manage, and report on Microsoft Defender Antivirus
3-
description: You can deploy and manage Microsoft Defender Antivirus with Intune, Microsoft Configuration Manager, Group Policy, PowerShell, or WMI
3+
description: You can deploy and manage Microsoft Defender Antivirus with Intune, Microsoft Configuration Manager, Group Policy, PowerShell, or WMI.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
66
ms.date: 10/20/2025
@@ -24,7 +24,6 @@ appliesto:
2424
---
2525
# Deploy, manage, and report on Microsoft Defender Antivirus
2626

27-
2827
You can manage and report on Microsoft Defender Antivirus using one of several tools, such as:
2928

3029
- [Deploy, manage, and report on Microsoft Defender Antivirus](#deploy-manage-and-report-on-microsoft-defender-antivirus)
@@ -33,8 +32,7 @@ You can manage and report on Microsoft Defender Antivirus using one of several t
3332
- [PowerShell](#powershell)
3433
- [Group Policy and Microsoft Entra ID](#group-policy-and-microsoft-entra-id)
3534
- [Windows Management Instrumentation](#windows-management-instrumentation)
36-
- [See also](#see-also)
37-
35+
3836
This article describes these options for deployment, management, and reporting.
3937

4038
## Prerequisites
@@ -74,7 +72,7 @@ For reporting, you can choose from several options:
7472

7573
## PowerShell
7674

77-
You can use PowerShell with Group Policy or Configuration Manager to manage Microsoft Defender Antivirus on client devices. You can also use PowerShell to manage Microsoft Defender Antivirus manually on individual devices that are not managed by a security team.
75+
You can use PowerShell with Group Policy or Configuration Manager to manage Microsoft Defender Antivirus on client devices. You can also use PowerShell to manage Microsoft Defender Antivirus manually on individual devices that aren't managed by a security team.
7876

7977
- Use the appropriate [Get- cmdlets available in the Defender module](/powershell/module/defender).
8078

@@ -124,6 +122,6 @@ For reporting, Windows events comprise several security event sources, including
124122

125123

126124
> [!TIP]
127-
> **Performance tip** Due to a variety of factors, Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues. You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions. See [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
125+
> **Performance tip**: Due to various factors, Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues. You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions. See [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
128126
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
129127

defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md

Lines changed: 23 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,6 @@ appliesto:
2525
---
2626
# Configure Microsoft Defender Antivirus on a remote desktop or virtual desktop infrastructure environment
2727

28-
29-
3028
This article is designed for customers who are using Microsoft Defender Antivirus capabilities only. If you have Microsoft Defender for Endpoint (which includes Microsoft Defender Antivirus alongside other device protection capabilities), see [Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR](configure-endpoints-vdi.md).
3129

3230
You can use Microsoft Defender Antivirus in a remote desktop (RDS) or non-persistent virtual desktop infrastructure (VDI) environment. Using the guidance in this article, you can configure updates to download directly to your RDS or VDI environments whenever a user signs in.
@@ -55,23 +53,23 @@ In Windows 10, version 1903, Microsoft introduced the shared security intelligen
5553

5654
1. On your Group Policy management computer, open the Group Policy Management Console, right-click the Group Policy Object you want to configure, and then select **Edit**.
5755

58-
2. In the Group Policy Management Editor, go to **Computer configuration**.
56+
1. In the Group Policy Management Editor, go to **Computer configuration**.
5957

60-
3. Select **Administrative templates**. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Security Intelligence Updates**.
58+
1. Select **Administrative templates**. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Security Intelligence Updates**.
6159

62-
4. Double-click **Define security intelligence location for VDI clients**, and then set the option to **Enabled**. A field automatically appears.
60+
1. Double-click **Define security intelligence location for VDI clients**, and then set the option to **Enabled**. A field automatically appears.
6361

64-
5. In the field, type `\\<File Server shared location\>\wdav-update`. (For help with this value, see [Download and unpackage](#download-and-unpackage-the-latest-updates).)
62+
1. In the field, type `\\<File Server shared location\>\wdav-update`. (For help with this value, see [Download and unpackage](#download-and-unpackage-the-latest-updates).)
6563

66-
6. Select **OK**, and then deploy the Group Policy Object to the VMs you want to test.
64+
1. Select **OK**, and then deploy the Group Policy Object to the VMs you want to test.
6765

6866
### PowerShell
6967

7068
1. On each RDS or VDI device, use the following cmdlet to enable the feature:
7169

7270
`Set-MpPreference -SharedSignaturesPath \\<File Server shared location>\wdav-update`
7371

74-
2. Push the update as you normally would push PowerShell-based configuration policies onto your VMs. (See the [Download and unpackage](#download-and-unpackage-the-latest-updates) section in this article. Look for the *shared location* entry.)
72+
1. Push the update as you normally would push PowerShell-based configuration policies onto your VMs. (See the [Download and unpackage](#download-and-unpackage-the-latest-updates) section in this article. Look for the *shared location* entry.)
7573

7674
## Download and unpackage the latest updates
7775

@@ -100,7 +98,7 @@ You can also set up your single server or machine to fetch the updates on behalf
10098

10199
1. Create an SMB/CIFS file share.
102100

103-
2. Use the following example to create a file share with the following share permissions.
101+
1. Use the following example to create a file share with the following share permissions.
104102

105103
```PowerShell
106104
@@ -121,19 +119,19 @@ You can also set up your single server or machine to fetch the updates on behalf
121119

122120
1. On the management machine, open the **Start** menu and type `Task Scheduler`. From the results, select Task Scheduler and then select **Create task...** in the side panel.
123121

124-
2. Specify the name as `Security intelligence unpacker`.
122+
1. Specify the name as `Security intelligence unpacker`.
125123

126-
3. On the **Trigger** tab, select **New...** > **Daily**, and select **OK**.
124+
1. On the **Trigger** tab, select **New...** > **Daily**, and select **OK**.
127125

128-
4. On the **Actions** tab, select **New...**.
126+
1. On the **Actions** tab, select **New...**.
129127

130-
5. Specify `PowerShell` in the **Program/Script** field.
128+
1. Specify `PowerShell` in the **Program/Script** field.
131129

132-
6. In the **Add arguments** field, type `-ExecutionPolicy Bypass c:\wdav-update\vdmdlunpack.ps1`, and then select **OK**.
130+
1. In the **Add arguments** field, type `-ExecutionPolicy Bypass c:\wdav-update\vdmdlunpack.ps1`, and then select **OK**.
133131

134-
7. Configure any other settings as appropriate.
132+
1. Configure any other settings as appropriate.
135133

136-
8. Select **OK** to save the scheduled task.
134+
1. Select **OK** to save the scheduled task.
137135

138136
To initiate the update manually, right-click on the task, and then select **Run**.
139137

@@ -143,19 +141,19 @@ If you would prefer to do everything manually, here's what to do to replicate th
143141

144142
1. Create a new folder on the system root called `wdav_update` to store intelligence updates. For example, create the folder `c:\wdav_update`.
145143

146-
2. Create a subfolder under `wdav_update` with a GUID name, such as `{00000000-0000-0000-0000-000000000000}`
144+
1. Create a subfolder under `wdav_update` with a GUID name, such as `{00000000-0000-0000-0000-000000000000}`
147145

148146
Here's an example: `c:\wdav_update\{00000000-0000-0000-0000-000000000000}`
149147

150148
> [!NOTE]
151149
> We set the script so that the last 12 digits of the GUID are the year, month, day, and time when the file was downloaded so that a new folder is created each time. You can change this so that the file is downloaded to the same folder each time.
152150
153-
3. Download a security intelligence package from [https://www.microsoft.com/wdsi/definitions](https://www.microsoft.com/wdsi/definitions) into the GUID folder. The file should be named `mpam-fe.exe`.
151+
1. Download a security intelligence package from [https://www.microsoft.com/wdsi/definitions](https://www.microsoft.com/wdsi/definitions) into the GUID folder. The file should be named `mpam-fe.exe`.
154152

155-
4. Open a Command Prompt window and navigate to the GUID folder you created. Use the `/X` extraction command to extract the files. For example `mpam-fe.exe /X`.
153+
1. Open a Command Prompt window and navigate to the GUID folder you created. Use the `/X` extraction command to extract the files. For example, `mpam-fe.exe /X`.
156154

157155
> [!NOTE]
158-
> The VMs will pick up the updated package whenever a new GUID folder is created with an extracted update package or whenever an existing folder is updated with a new extracted package.
156+
> The VMs pick up the updated package whenever a new GUID folder is created with an extracted update package or whenever an existing folder is updated with a new extracted package.
159157
160158
## Microsoft Defender Antivirus configuration settings
161159

@@ -204,7 +202,7 @@ It's important to take advantage of the included threat protection capabilities
204202
- Enable file hash computation feature: `Enabled`
205203

206204
> [!NOTE]
207-
> "Enable file hash computation feature" is only needed if using Indicators – File hash. It can cause higher amount of CPU utilization, since it has to parse thru each binary on disk to get the file hash.
205+
> "Enable file hash computation feature" is only needed if using Indicators – File hash. It can cause higher amount of CPU utilization, since it has to parse through each binary on disk to get the file hash.
208206
209207
### Real-time protection
210208

@@ -237,7 +235,7 @@ It's important to take advantage of the included threat protection capabilities
237235
- Turn on catch-up quick scan (Disable catchup quick scan): `Not configured`
238236

239237
> [!NOTE]
240-
> If you want to harden, you could change "Turn on catch-up quick scan" to `Enabled`, which will help when VMs have been offline, and have missed two or more consecutive scheduled scans. But since it is running a scheduled scan, it will use additional CPU.
238+
> If you want to harden, you could change "Turn on catch-up quick scan" to `Enabled`, which helps when VMs are offline, and have missed two or more consecutive scheduled scans. But since it's running a scheduled scan, it uses additional CPU.
241239
242240
- Turn on e-mail scanning: `Enabled`
243241

@@ -327,12 +325,12 @@ Optimize the "Windows Defender Cache Maintenance" scheduled task for non-persist
327325

328326
1. Open up the **Task Scheduler** mmc (`taskschd.msc`).
329327

330-
2. Expand **Task Scheduler Library** > **Microsoft** > **Windows** > **Windows Defender**, and then right-click on **Windows Defender Cache Maintenance**.
328+
1. Expand **Task Scheduler Library** > **Microsoft** > **Windows** > **Windows Defender**, and then right-click on **Windows Defender Cache Maintenance**.
331329

332-
3. Select **Run**, and let the scheduled task finish.
330+
1. Select **Run**, and let the scheduled task finish.
333331

334332
> [!WARNING]
335-
> If you do not do this, it can cause higher cpu utilization while the cache maintenance task is running on each of the VMs.
333+
> If you don't do this, it can cause higher cpu utilization while the cache maintenance task is running on each of the VMs.
336334
337335
### Enable tamper protection
338336

defender-endpoint/enable-controlled-folders.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Enable controlled folder access
3-
description: Learn how to protect your important files by enabling Controlled folder access
3+
description: Learn how to protect your important files by enabling Controlled folder access.
44
ms.service: defender-endpoint
55
ms.topic: how-to
66
ms.localizationpriority: medium
@@ -37,8 +37,7 @@ You can enable controlled folder access by using any of these methods:
3737
- [Microsoft Configuration Manager](#microsoft-configuration-manager)
3838
- [Group Policy](#group-policy)
3939
- [PowerShell](#powershell)
40-
- [See also](#see-also)
41-
40+
4241
## Prerequisites
4342

4443
### Supported operating systems
@@ -96,13 +95,13 @@ For more information about Microsoft Configuration Manager and Controlled Folder
9695

9796
1. Expand the tree to **Windows components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Controlled folder access**.
9897

99-
1. Double-click the **Configure Controlled folder access** setting and set the option to **Enabled**. In the options section you must specify one of the following options:
98+
1. Double-click the **Configure Controlled folder access** setting and set the option to **Enabled**. In the options section, you must specify one of the following options:
10099

101100
- **Enable** - Malicious and suspicious apps aren't allowed to make changes to files in protected folders. A notification is provided in the Windows event log.
102101
- **Disable (Default)** - The Controlled folder access feature won't work. All apps can make changes to files in protected folders.
103102
- **Audit Mode** - Changes are allowed if a malicious or suspicious app attempts to make a change to a file in a protected folder. However, it's recorded in the Windows event log where you can assess the impact on your organization.
104-
- **Block disk modification only** - Attempts by untrusted apps to write to disk sectors will be logged in Windows Event log. These logs can be found in **Applications and Services Logs** > Microsoft > Windows > Windows Defender > Operational > ID 1123.
105-
- **Audit disk modification only** - Only attempts to write to protected disk sectors will be recorded in the Windows event log (under **Applications and Services Logs** > **Microsoft** > **Windows** > **Windows Defender** > **Operational** > **ID 1124**). Attempts to modify or delete files in protected folders won't be recorded.
103+
- **Block disk modification only** - Attempts by untrusted apps to write to disk sectors are logged in Windows Event log. These logs can be found in **Applications and Services Logs** > Microsoft > Windows > Windows Defender > Operational > ID 1123.
104+
- **Audit disk modification only** - Only attempts to write to protected disk sectors are recorded in the Windows event log (under **Applications and Services Logs** > **Microsoft** > **Windows** > **Windows Defender** > **Operational** > **ID 1124**). Attempts to modify or delete files in protected folders won't be recorded.
106105

107106
:::image type="content" source="/defender/media/cfa-gp-enable.png" alt-text="Screenshot shows the group policy option enabled and Audit Mode selected." lightbox="/defender/media/cfa-gp-enable.png":::
108107

0 commit comments

Comments
 (0)