You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-endpoints-vdi.md
+2-66Lines changed: 2 additions & 66 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ Like any other system in an IT environment, these too should have an Endpoint De
39
39
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-configvdi-abovefoldlink)
40
40
41
41
> [!NOTE]
42
-
> **Persistent VDI's** - Onboarding a persistent VDI machine into Microsoft Defender for Endpoint is handled the same way you would onboard a physical machine, such as a desktop or laptop. Group policy, Microsoft Configuration Manager, and other methods can be used to onboard a persistent machine. In the Microsoft Defender portal, (https://security.microsoft.com) under onboarding, select your preferred onboarding method, and follow the instructions for that type. For more information see [Onboarding Windows client](onboard-windows-client.md).
42
+
> **Persistent VDI's** - Onboarding a persistent VDI machine into Microsoft Defender for Endpoint is handled the same way you would onboard a physical machine, such as a desktop or laptop. Group policy, Microsoft Configuration Manager, and other methods can be used to onboard a persistent machine. In the Microsoft Defender portal, (https://security.microsoft.com) under onboarding, select your preferred onboarding method, and follow the instructions for that type. For more information see [Onboarding Windows client](onboard-windows-client.md).
@@ -184,71 +184,7 @@ After onboarding devices to the service, it's important to take advantage of the
184
184
185
185
### Next generation protection configuration
186
186
187
-
The following configuration settings are recommended:
188
-
189
-
#### Cloud Protection Service
190
-
191
-
- Turn on cloud-delivered protection: Yes
192
-
- Cloud-delivered protection level: Not configured
193
-
- Defender Cloud Extended Timeout In Seconds: 20
194
-
195
-
#### Exclusions
196
-
197
-
- Please review the FXLogix antivirus exclusion recommendations here: [Prerequisites for FSLogix](/fslogix/overview-prerequisites#file--folder-exclusions).
198
-
199
-
#### Real-time Protection
200
-
201
-
- Turn on all settings and set to monitor all files
202
-
203
-
#### Remediation
204
-
205
-
- Number of days to keep quarantined malware: 30
206
-
- Submit samples consent: Send all samples automatically
207
-
- Action to take on potentially unwanted apps: Enable
208
-
- Actions for detected threats:
209
-
- Low threat: Clean
210
-
- Moderate threat, High threat, Severe threat: Quarantine
211
-
212
-
#### Scan
213
-
214
-
- Scan archived files: Yes
215
-
- Use low CPU priority for scheduled scans: Not configured
216
-
- Disable catch-up full scan: Not configured
217
-
- Disable catchup quick scan: Not configured
218
-
- CPU usage limit per scan: 50
219
-
- Scan mapped network drives during full scan: Not configured
220
-
- Run daily quick scan at: 12 PM
221
-
- Scan type: Not configured
222
-
- Day of week to run scheduled scan: Not configured
223
-
- Time of day to run a scheduled scan: Not configured
224
-
- Check for signature updates before running scan: Yes
225
-
226
-
#### Updates
227
-
228
-
- Enter how often to check for security intelligence updates: 8
229
-
- Leave other settings in default state
230
-
231
-
#### User experience
232
-
233
-
- Allow user access to Microsoft Defender app: Not configured
234
-
235
-
#### Enable Tamper protection
236
-
237
-
- Enable tamper protection to prevent Microsoft Defender being disabled: Enable
238
-
239
-
#### Attack surface reduction
240
-
241
-
- Enable network protection: Test mode
242
-
- Require SmartScreen for Microsoft Edge: Yes
243
-
- Block malicious site access: Yes
244
-
- Block unverified file download: Yes
245
-
246
-
#### Attack surface reduction rules
247
-
248
-
- Configure all available rules to Audit.
249
-
250
-
> [!NOTE]
251
-
> Blocking these activities may interrupt legitimate business processes. The best approach is setting everything to audit, identifying which ones are safe to turn on, and then enabling those settings on endpoints which do not have false positive detections.
187
+
The configuration settings in this link are recommended: [Configure Microsoft Defender Antivirus on a remote desktop or virtual desktop infrastructure environment](/defender-endpoint/deployment-vdi-microsoft-defender-antivirus).
0 commit comments