Skip to content

Commit d1e0399

Browse files
committed
Merge branch 'main' into deniseb-portal
2 parents fbcb23b + f87d689 commit d1e0399

File tree

6 files changed

+119
-103
lines changed

6 files changed

+119
-103
lines changed

defender-endpoint/configure-server-endpoints.md

Lines changed: 53 additions & 55 deletions
Large diffs are not rendered by default.

defender-endpoint/microsoft-defender-antivirus-on-windows-server.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.author: ewalsh
99
ms.reviewer: pahuijbr
1010
manager: deniseb
1111
ms.topic: conceptual
12-
ms.date: 03/14/2025
12+
ms.date: 03/18/2025
1313
ms.collection:
1414
- m365-security
1515
- tier2
@@ -52,7 +52,7 @@ The process of setting up and running Microsoft Defender Antivirus on Windows Se
5252
## Enable the user interface on Windows Server
5353

5454
> [!IMPORTANT]
55-
> If you're using Windows Server 2012 R2, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages).
55+
> If you're using Windows Server 2012 R2, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-defender-for-endpoint-packages).
5656
5757
By default, Microsoft Defender Antivirus is installed and functional on Windows Server. Sometimes, the user interface (GUI) is installed by default. The GUI isn't required; you can use PowerShell, Group Policy, or other methods to manage Microsoft Defender Antivirus. However, many organizations prefer to use the GUI for Microsoft Defender Antivirus. To install the GUI, use one of the procedures in the following table:
5858

@@ -188,7 +188,7 @@ For more information, see [Working with Registry Keys](/powershell/scripting/sam
188188

189189
If your Windows Server is onboarded to Microsoft Defender for Endpoint, you can run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and Windows Server 2016. See the following articles:
190190

191-
- [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages)
191+
- [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-defender-for-endpoint-packages)
192192

193193
- [Microsoft Defender Antivirus compatibility with other security products](microsoft-defender-antivirus-compatibility.md)
194194

defender-endpoint/offboard-machines.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: conceptual
1414
ms.subservice: onboard
1515
search.appverid: met150
16-
ms.date: 03/14/2025
16+
ms.date: 03/17/2025
1717
---
1818

1919
# Offboard devices
@@ -23,12 +23,12 @@ ms.date: 03/14/2025
2323

2424
**Applies to:**
2525

26-
- [Microsoft Defender for Endpoint Plan 1 and 2](microsoft-defender-endpoint.md)
27-
- Microsoft Defender for Endpoint for servers
28-
- [Microsoft Defender for Servers Plan 1 and Plan 2](/azure/defender-for-cloud/integration-defender-for-endpoint)
29-
- [Microsoft Defender for Business](/defender-business/get-defender-business)
30-
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)
31-
- [Microsoft Defender XDR](/defender-xdr)
26+
- Microsoft Defender for Endpoint Plan 1 and 2
27+
- Microsoft Defender for Endpoint for servers Plan 1 or Plan 2
28+
- Microsoft Defender for Servers Plan 1 or Plan 2
29+
- Microsoft Defender for Business
30+
- Microsoft Defender Vulnerability Management
31+
- Microsoft Defender XDR
3232

3333
**Platforms**
3434

@@ -38,8 +38,8 @@ ms.date: 03/14/2025
3838
- Windows Server 2019
3939
- Windows Server 2016
4040
- Windows Server 2012 R2
41-
- Mac
42-
- Linux Server
41+
- Mac devices
42+
- Linux servers
4343

4444
When you offboard a device from Defender for Endpoint, no new detections, vulnerability, or security data are sent to the Microsoft Defender portal. Seven days after offboarding a device, its status changes to [inactive](/defender-endpoint/fix-unhealthy-sensors#inactive-devices). Devices that weren't active within the past 30 days are not factored into your organization's [exposure score](/defender-vulnerability-management/tvm-exposure-score).
4545

defender-endpoint/onboard-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ search.appverid: met150
1717
ms.date: 03/17/2025
1818
---
1919

20-
# Onboard servers through Microsoft Defender for Endpoint's device onboarding experience
20+
# Onboard servers through Microsoft Defender for Endpoint's onboarding experience
2121

2222
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2323

defender-endpoint/server-migration.md

Lines changed: 50 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
author: denisebmsft
77
ms.author: deniseb
88
ms.localizationpriority: medium
9-
ms.date: 09/19/2022
9+
ms.date: 03/18/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -27,14 +27,14 @@ ms.subservice: onboard
2727
- Microsoft Defender for Servers Plan 1 or Plan 2
2828

2929
> [!NOTE]
30-
> Always ensure the operating system, and Microsoft Defender Antivirus on Windows Server 2016, are fully updated before proceeding with installation or upgrade. To receive regular product improvements and fixes for the EDR Sensor component, ensure Windows Update [KB5005292](https://go.microsoft.com/fwlink/?linkid=2168277) gets applied or approved after installation. In addition, to keep protection components updated, please reference [Manage Microsoft Defender Antivirus updates and apply baselines](/defender-endpoint/microsoft-defender-antivirus-updates/#platform-and-engine-releases).
30+
> On Windows Server 2016, always ensure the operating system and Microsoft Defender Antivirus are fully updated before proceeding with installation or upgrade. To receive regular product improvements and fixes for the EDR Sensor component, ensure Windows Update [KB5005292](https://go.microsoft.com/fwlink/?linkid=2168277) gets applied or approved after installation. In addition, to keep protection components updated, please reference [Manage Microsoft Defender Antivirus updates and apply baselines](/defender-endpoint/microsoft-defender-antivirus-updates/#platform-and-engine-releases).
3131
32-
These instructions apply to the new unified solution and installer (MSI) package of Microsoft Defender for Endpoint for Windows Server 2012 R2 and Windows Server 2016. This article contains high-level instructions for various possible migration scenarios from the previous to the current solution. These high-level steps are intended as guidelines to be adjusted to the deployment and configuration tools available in your environment.
32+
These instructions apply to the new unified solution and installer (MSI) package of Defender for Endpoint for Windows Server 2012 R2 and Windows Server 2016. This article contains high-level instructions for various possible migration scenarios from the previous to the current solution. These high-level steps are intended as guidelines to be adjusted to the deployment and configuration tools available in your environment.
3333

3434
**If you are using Microsoft Defender for Cloud to perform deployment, you can automate installation and upgrade. See [Defender for Servers Plan 2 now integrates with MDE unified solution](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-servers-plan-2-now-integrates-with-mde-unified/ba-p/3527534)**
3535

3636
> [!NOTE]
37-
> Operating system upgrades with Microsoft Defender for Endpoint installed aren't supported. Offboard and uninstall, upgrade the operating system, then proceed with installation.
37+
> Operating system upgrades with Defender for Endpoint installed aren't supported. Offboard, uninstall, upgrade the operating system, and then proceed with installation.
3838
3939
## Installer script
4040

@@ -43,60 +43,77 @@ These instructions apply to the new unified solution and installer (MSI) package
4343
4444
To facilitate upgrades when Microsoft Endpoint Configuration Manager isn't yet available or updated to perform the automated upgrade, you can use this [upgrade script](https://github.com/microsoft/mdefordownlevelserver/archive/refs/heads/main.zip). Download it by selection the "Code" button and downloading the .zip file, then extracting install.ps1. It can help automate the following required steps:
4545

46-
1. Remove the OMS workspace for Microsoft Defender for Endpoint (OPTIONAL).
46+
1. Remove the OMS workspace for Defender for Endpoint (OPTIONAL).
47+
4748
2. Remove System Center Endpoint Protection (SCEP) client if installed.
49+
4850
3. Download and install [prerequisites](configure-server-endpoints.md#prerequisites) if necessary.
49-
4. Enable and update the Defender Antivirus feature on Windows Server 2016
50-
5. Install Microsoft Defender for Endpoint.
51-
6. Apply the onboarding script **for use with Group Policy** downloaded from [Microsoft Defender XDR](https://security.microsoft.com).
5251

53-
To use the script, download it to an installation directory where you have also placed the installation and onboarding packages (see [Configure server endpoints](configure-server-endpoints.md)).
52+
4. Enable and update the Microsoft Defender Antivirus feature on Windows Server 2016.
53+
54+
5. Install Defender for Endpoint.
5455

55-
EXAMPLE: .\install.ps1 -RemoveMMA <YOUR_WORKSPACE_ID> -OnboardingScript ".\WindowsDefenderATPOnboardingScript.cmd"
56+
6. Apply the onboarding script **for use with Group Policy** downloaded from the [Microsoft Defender portal](https://security.microsoft.com).
5657

57-
For more information on how to use the script, use the PowerShell command "get-help .\install.ps1".
58+
To use the script, download it to an installation directory where you have also placed the installation and onboarding packages (see [Configure server endpoints](configure-server-endpoints.md)).
59+
60+
EXAMPLE: `.\install.ps1 -RemoveMMA <YOUR_WORKSPACE_ID> -OnboardingScript ".\WindowsDefenderATPOnboardingScript.cmd"`
61+
62+
For more information on how to use the script, use the PowerShell command `get-help .\install.ps1`.
5863

5964
## Microsoft Endpoint Configuration Manager migration scenarios
6065

6166
> [!NOTE]
62-
> You'll need Microsoft Endpoint Configuration Manager, version 2107 or later to perform Endpoint Protection policy configuration. From [version 2207 or later](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2207#improved-microsoft-defender-for-endpoint-mde-onboarding-for-windows-server-2012-r2-and-windows-server-2016) deployment and upgrades can be fully automated.
67+
> You'll need Configuration Manager, version 2107 or later to perform Endpoint Protection policy configuration. From [version 2207 or later](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2207#improved-microsoft-defender-for-endpoint-mde-onboarding-for-windows-server-2012-r2-and-windows-server-2016) deployment and upgrades can be fully automated.
6368
64-
For instructions on how to migrate using Microsoft Endpoint Configuration Manager older than version 2207, see [Migrating servers from Microsoft Monitoring Agent to the unified solution.](application-deployment-via-mecm.md)
69+
For instructions on how to migrate using Configuration Manager older than version 2207, see [Migrating servers from Microsoft Monitoring Agent to the unified solution.](application-deployment-via-mecm.md)
6570

6671
## If you are running a non-Microsoft antivirus solution
6772

6873
1. Fully update the machine including Microsoft Defender Antivirus (Windows Server 2016) ensuring [prerequisites](configure-server-endpoints.md#prerequisites) have been met. For more information on the prerequisites that have to be met, see [Prerequisites for Windows Server 2016](configure-server-endpoints.md#prerequisites-for-windows-server-2016-and-windows-server-2012-r2).
69-
2. Ensure third-party antivirus management no longer pushes antivirus agents to these machines.*
70-
3. Author your policies for the protection capabilities in Microsoft Defender for Endpoint and target those to the machine in the tool of your choice.
71-
4. Install the Microsoft Defender for Endpoint for Windows Server 2012 R2 and 2016 package and **enable passive mode**. See [Install Microsoft Defender Antivirus using command line](configure-server-endpoints.md#install-microsoft-defender-for-endpoint-using-the-command-line).
72-
a. Apply the onboarding script **for use with Group Policy** downloaded from [Microsoft Defender XDR](https://security.microsoft.com).
73-
5. Apply updates.
74-
6. Remove your non-Microsoft antivirus software by either using the non-Microsoft antivirus console or by using Microsoft Endpoint Configuration Manager as
75-
appropriate. Make sure to remove passive mode configuration.*
7674

77-
> [!TIP]
78-
> You can use the [installer-script](server-migration.md#installer script) as part of your application to automate the above steps. To enable passive mode, apply the -Passive flag. For example, .\install.ps1 -RemoveMMA <YOUR_WORKSPACE_ID> -OnboardingScript ".\WindowsDefenderATPOnboardingScript.cmd" -Passive
75+
2. Ensure your non-Microsoft antivirus management solution no longer pushes antivirus agents to these machines.
7976

80-
*These steps only apply if you intend to replace your non-Microsoft antivirus solution. See [Better together: Microsoft Defender Antivirus and Microsoft Defender for Endpoint](why-use-microsoft-defender-antivirus.md).
77+
3. Author your policies for the protection capabilities in Defender for Endpoint and target those to the machine in the tool of your choice.
78+
79+
4. Install the Defender for Endpoint package for Windows Server 2012 R2 and Windows Server 2016, and set it to passive mode.
80+
81+
See [Install Microsoft Defender Antivirus using command line](configure-server-endpoints.md#install-defender-for-endpoint-using-the-command-line).
82+
83+
5. Apply the onboarding script **for use with Group Policy** downloaded from the [Microsoft Defender portal](https://security.microsoft.com).
84+
85+
6. Apply updates.
8186

82-
To move a machine out of passive mode, set the following key to 0:
87+
7. Remove your non-Microsoft antivirus software by either using the non-Microsoft antivirus console or by using Configuration Manager as appropriate. Make sure to remove passive mode configuration.
8388

84-
Path: HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection
85-
Name: ForceDefenderPassiveMode
86-
Type: REG_DWORD
87-
Value: 0
89+
To move a machine out of passive mode, set the following key:
8890

89-
## If you are running System Center Endpoint Protection but aren't managing the machine using Microsoft Endpoint Configuration Manager (MECM/ConfigMgr)
91+
Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`
92+
Name: `ForceDefenderPassiveMode`
93+
Type: `REG_DWORD`
94+
Value: `0`
95+
96+
> [!TIP]
97+
> You can use the [installer-script](server-migration.md#installer script) as part of your application to automate the above steps. To enable passive mode, apply the -Passive flag. For example, `.\install.ps1 -RemoveMMA <YOUR_WORKSPACE_ID> -OnboardingScript ".\WindowsDefenderATPOnboardingScript.cmd" -Passive`.
98+
99+
In the preceding procedure, steps 2 and 7 apply only if you intend to replace your non-Microsoft antivirus solution. See [Better together: Microsoft Defender Antivirus and Microsoft Defender for Endpoint](why-use-microsoft-defender-antivirus.md).
100+
101+
## If you are running System Center Endpoint Protection but aren't managing the machine using Configuration Manager (MECM/ConfigMgr)
90102

91103
1. Fully update the machine including Microsoft Defender Antivirus (Windows Server 2016) ensuring [prerequisites](configure-server-endpoints.md#prerequisites) have been met.
92-
2. Create and apply policies using Group Policy, PowerShell, or a 3rd party management solution.
104+
105+
2. Create and apply policies using Group Policy, PowerShell, or a non-Microsoft management solution.
106+
93107
3. Uninstall System Center Endpoint Protection (Windows Server 2012 R2).
108+
94109
4. Install Microsoft Defender for Endpoint (see [Configure server endpoints](configure-server-endpoints.md).)
95-
5. Apply the onboarding script **for use with Group Policy** downloaded from [Microsoft Defender XDR](https://security.microsoft.com).
110+
111+
5. Apply the onboarding script **for use with Group Policy** downloaded from the [Microsoft Defender portal](https://security.microsoft.com).
112+
96113
6. Apply updates.
97114

98115
> [!TIP]
99-
> You can use the installer script to automate the above steps.
116+
> You can use the installer script to automate the steps in the preceding procedure.
100117
101118
## Microsoft Defender for Cloud scenarios
102119

@@ -107,4 +124,5 @@ If you're using Microsoft Defender for Cloud, you can use the automated upgrade
107124
## Group Policy configuration
108125

109126
For configuration using Group Policy, ensure you're using the latest ADMX files in your central store to access the correct Defender for Endpoint policy options. For reference, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](/troubleshoot/windows-client/group-policy/create-and-manage-central-store) and download the latest files **for use with Windows 10**.
127+
110128
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/switch-to-mde-phase-2.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.subservice: onboard
66
ms.author: deniseb
77
author: denisebmsft
88
ms.localizationpriority: medium
9-
ms.date: 09/13/2024
9+
ms.date: 03/17/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -61,7 +61,7 @@ As you're making the switch to Defender for Endpoint, you might need to take cer
6161
### Set Microsoft Defender Antivirus to passive mode on Windows Server
6262

6363
> [!TIP]
64-
> You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and 2016. For more information, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages).
64+
> You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and 2016. For more information, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-defender-for-endpoint-packages).
6565
6666
1. Open Registry Editor, and then navigate to `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
6767

@@ -78,7 +78,7 @@ If Microsoft Defender Antivirus features and installation files were previously
7878
7979
### Are you using Windows Server 2012 R2 or Windows Server 2016?
8080

81-
You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and 2016 using the method described in the previous section. For more information, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages).
81+
You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and 2016 using the method described in the previous section. For more information, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-defender-for-endpoint-packages).
8282

8383
## Step 2: Configure Defender for Endpoint Plan 1 or Plan 2
8484

0 commit comments

Comments
 (0)