Skip to content

Commit ec38961

Browse files
authored
Merge pull request #1267 from YongRhee-MSFT/docs-editor/microsoft-defender-antivirus-c-1725393569
Update microsoft-defender-antivirus-compatibility.md
2 parents 4ee09a5 + fc0abcf commit ec38961

File tree

1 file changed

+23
-20
lines changed

1 file changed

+23
-20
lines changed

defender-endpoint/microsoft-defender-antivirus-compatibility.md

Lines changed: 23 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about Microsoft Defender Antivirus with other security produc
44
ms.service: defender-endpoint
55
ms.subservice: ngp
66
ms.localizationpriority: medium
7-
ms.date: 05/17/2024
7+
ms.date: 09/07/2024
88
ms.topic: conceptual
99
author: siosulli
1010
ms.author: siosulli
@@ -60,9 +60,9 @@ In general, Microsoft Defender Antivirus doesn't run in passive mode on devices
6060
The following table summarizes what to expect:
6161

6262
|Windows version|Primary antivirus/antimalware solution|Microsoft Defender Antivirus state|
63-
|:---|:---|:---|
63+
|---|---|---|
6464
|Windows 10 <br/>Windows 11|Microsoft Defender Antivirus|Active mode|
65-
|Windows 10 <br/>Windows 11|A non-Microsoft antivirus/antimalware solution|Disabled mode (happens automatically) <br/><br/> Note that in Windows 11, if SmartAppControl is enabled, Microsoft Defender Antivirus goes into passive mode.|
65+
|Windows 10 <br/>Windows 11|A non-Microsoft antivirus/antimalware solution|Disabled mode (happens automatically) <br/><br/> In Windows 11, if SmartAppControl is enabled, Microsoft Defender Antivirus goes into passive mode.|
6666
|Windows Server 2022 <br/>Windows Server 2019<br/>Windows Server, version 1803, or newer <br/>Windows Server 2016 <br/>Windows Server 2012 R2 |Microsoft Defender Antivirus|Active mode|
6767
|Windows Server 2022<br/>Windows Server 2019<br/>Windows Server, version 1803, or newer <br/>Windows Server 2016 |A non-Microsoft antivirus/antimalware solution|Disabled<br/>(set manually; see the note that follows this table) |
6868

@@ -80,7 +80,7 @@ If the device is onboarded to Microsoft Defender for Endpoint, you can use Micro
8080
8181
Whether Microsoft Defender Antivirus runs in active mode, passive mode, or is disabled depends on several factors, such as:
8282

83-
- Which version of Windows is installed on an endpoint
83+
- The version of Windows installed on an endpoint
8484
- Whether Microsoft Defender Antivirus is the primary antivirus/antimalware solution on the endpoint
8585
- Whether the endpoint is onboarded to Defender for Endpoint
8686

@@ -113,7 +113,7 @@ For passive mode to work on endpoints running Windows Server 2016 and Windows Se
113113
> [!IMPORTANT]
114114
> Beginning with [platform version 4.18.2208.0 and later](msda-updates-previous-versions-technical-upgrade-support.md#september-2022-platform-41822097--engine-11197003), if a server is onboarded to Microsoft Defender for Endpoint, [tamper protection](/editor/MicrosoftDocs/microsoft-365-docs-pr/microsoft-365%2Fsecurity%2Fdefender-endpoint%2Fmicrosoft-defender-antivirus-compatibility.md/main/9a5f8a9f-f5b9-cd00-0d21-171936a25b2b/prevent-changes-to-security-settings-with-tamper-protection.md) allows a switch to active mode, but not to passive mode.
115115
>
116-
> Note the modified logic for `ForceDefenderPassiveMode` when tamper protection is enabled: Once Microsoft Defender Antivirus is set to active mode, tamper protection prevents it from going back into passive mode even when `ForceDefenderPassiveMode` is set to `1`.
116+
> Notice the modified logic for `ForceDefenderPassiveMode` when tamper protection is enabled: Once Microsoft Defender Antivirus is set to active mode, tamper protection prevents it from going back into passive mode even when `ForceDefenderPassiveMode` is set to `1`.
117117
118118
On Windows Server 2016, Windows Server 2012 R2, Windows Server version 1803 or newer, Windows Server 2019, and Windows Server 2022, if you're using a non-Microsoft antivirus product on an endpoint that *isn't* onboarded to Microsoft Defender for Endpoint, disable/uninstall Microsoft Defender Antivirus manually to prevent problems caused by having multiple antivirus products installed on a server. However, Defender for Endpoint includes capabilities that further extend the antivirus protection that is installed on your endpoint. If you have Defender for Endpoint, you can benefit from running Microsoft Defender Antivirus alongside another antivirus solution.
119119

@@ -146,7 +146,7 @@ Defender for Endpoint affects whether Microsoft Defender Antivirus can run in pa
146146
> - **Do not turn off capabilities**, such as real-time protection, cloud-delivered protection, or limited periodic scanning if you are using Microsoft Defender Antivirus in passive mode, or if you are using [EDR in block mode](edr-in-block-mode.md), which works behind the scenes to detect and remediate malicious artifacts that were detected post-breach.
147147
148148
| Protection | Microsoft Defender Antivirus <br/>(*Active mode*) | Microsoft Defender Antivirus <br/>(*Passive mode*) | Microsoft Defender Antivirus <br/>(*Disabled or uninstalled*) |
149-
|:---|:---|:---|:---|
149+
|---|---|---|---|
150150
| [Real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md) | Yes | [See note 1](#notes-about-protection-states) | No |
151151
| [Cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) | Yes | No | No |
152152
| [Network protection](network-protection.md) | Yes | No | No |
@@ -162,15 +162,20 @@ Defender for Endpoint affects whether Microsoft Defender Antivirus can run in pa
162162

163163
### Notes about protection states
164164

165-
1. In general, when Microsoft Defender Antivirus is in passive mode, real-time protection doesn't provide any blocking or enforcement, even though it's enabled and in passive mode.
165+
1. When Microsoft Defender Antivirus is in passive mode, real-time protection behaves in the following ways with Microsoft Endpoint Data Loss Prevention (Endpoint DLP):
166+
167+
|Microsoft Defender Antivirus in passive mode| Real-time protection state|
168+
| -------- | -------- |
169+
|Endpoint DLP is disabled|Disabled <br/><br/> Doesn't provide any antivirus real-time protection blocking or enforcement.|
170+
|Endpoint DLP is enabled|Enabled for DLP specific functionalities <br/><br/> Doesn't provide any antivirus real-time protection blocking or enforcement. <br/><br/>Make sure to add Microsoft Defender Antivirus and Microsoft Defender for Endpoint binaries to the exclusion list of the non-Microsoft antivirus or EDR solution.|
166171

167172
2. When Microsoft Defender Antivirus is in passive mode, scans aren't scheduled. If scans *are* scheduled in your configuration, the schedule is ignored. Unless:
168173

169-
a. "Start the scheduled scan only when computer is on but not in use" is set to "Not configured or enabled". A Windows Task Scheduler is created unless you set "Start the scheduled scan only when computer is on but not in use" to disabled.
174+
1. "Start the scheduled scan only when computer is on but not in use" is set to "Not configured or enabled". A Windows Task Scheduler is created unless you set "Start the scheduled scan only when computer is on but not in use" to disabled.
170175

171-
b. "Turn on catch-up quick scan" is set to "Not configured or enabled". Every 30 days (default number of days) a quick catchup scan continues to occur unless "Turn on catch-up quick scan" is set to disabled. Scan tasks that are set up in Windows Task Scheduler continue to run according to their schedule. If you have scheduled tasks, you can remove them, if preferred.
176+
1. "Turn on catch-up quick scan" is set to "Not configured or enabled". Every 30 days (default number of days) a quick catchup scan continues to occur unless "Turn on catch-up quick scan" is set to disabled. Scan tasks that are set up in Windows Task Scheduler continue to run according to their schedule. If you have scheduled tasks, you can remove them, if preferred.
172177

173-
c. "Turn on scan after security intelligence update" is set to "Not configured or enabled". By default, a quick scan occurs after a "Security Intelligence Update" unless you set "Turn on scan after security intelligence update" to disabled.
178+
1. "Turn on scan after security intelligence update" is set to "Not configured or enabled". By default, a quick scan occurs after a "Security Intelligence Update" unless you set "Turn on scan after security intelligence update" to disabled.
174179

175180
3. When Microsoft Defender Antivirus is in passive mode, it doesn't remediate threats. However, [Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md) can remediate threats. In this case, you might see alerts showing Microsoft Defender Antivirus as a source, even when Microsoft Defender Antivirus is in passive mode.
176181

@@ -181,7 +186,7 @@ Defender for Endpoint affects whether Microsoft Defender Antivirus can run in pa
181186
> [!IMPORTANT]
182187
> - [Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-learn-about) protection continues to operate normally when Microsoft Defender Antivirus is in either active or passive mode.
183188
>
184-
> - Don't disable, stop, or modify any of the associated services that are used by Microsoft Defender Antivirus, Defender for Endpoint, or the Windows Security app. This recommendation includes the *wscsvc*, *SecurityHealthService*, *MsSense*, *Sense*, *WinDefend*, or *MsMpEng* services and processes. Manually modifying these services can cause severe instability on your devices and can make your network vulnerable. Disabling, stopping, or modifying those services can also cause problems when using non-Microsoft antivirus solutions and how their information is displayed in the [Windows Security app](microsoft-defender-security-center-antivirus.md).
189+
> - Don't disable, stop, or modify any of the associated services that are used by Microsoft Defender Antivirus, Defender for Endpoint, or the Windows Security app. This recommendation includes the `wscsvc`, `SecurityHealthService`, `MsSense`, `Sense`, `WinDefend`, or `MsMpEng` services and processes. Manually modifying these services can cause severe instability on your devices and can make your network vulnerable. Disabling, stopping, or modifying those services can also cause problems when using non-Microsoft antivirus solutions and how their information is displayed in the [Windows Security app](microsoft-defender-security-center-antivirus.md).
185190
>
186191
> - In Defender for Endpoint, you can turn EDR in block mode on, even if Microsoft Defender Antivirus isn't your primary antivirus solution. EDR in block mode detects and remediate malicious items that are found on the device (post breach). To learn more, see [EDR in block mode](edr-in-block-mode.md).
187192
@@ -222,7 +227,7 @@ You can use one of several methods to confirm the state of Microsoft Defender An
222227

223228
### Use Windows PowerShell to confirm that Microsoft Defender Antivirus is running
224229

225-
> [!NOTE]
230+
> [!IMPORTANT]
226231
> Use this procedure only to confirm whether Microsoft Defender Antivirus is running on an endpoint.
227232
228233
1. On a Windows device, open Windows PowerShell.
@@ -233,7 +238,7 @@ You can use one of several methods to confirm the state of Microsoft Defender An
233238

234239
### Use Windows PowerShell to confirm that antivirus protection is running
235240

236-
> [!NOTE]
241+
> [!IMPORTANT]
237242
> Use this procedure only to confirm whether antivirus protection is enabled on an endpoint.
238243
239244
1. On a Windows device, open Windows PowerShell.
@@ -242,22 +247,19 @@ You can use one of several methods to confirm the state of Microsoft Defender An
242247

243248
3. Review the results. You should see **Normal**, **Passive**, or **EDR Block Mode** if antivirus protection is enabled on the endpoint.
244249

245-
> [!NOTE]
246-
> Note that this procedure is only to confirm whether antivirus protection is enabled on an endpoint.
247-
248250
## More details about Microsoft Defender Antivirus states
249251

250252
The following sections describe what to expect when Microsoft Defender Antivirus is:
251253

252254
- [In active mode](#active-mode)
253-
- [In passive mode, or when EDR in block mode is turned on](#passive-mode-or-edr-block-mode)
255+
- [In passive mode, or when EDR in block mode is turned on](#passive-mode-or-edr-in-block-mode)
254256
- [Disabled or uninstalled](#disabled-or-uninstalled)
255257

256258
### Active mode
257259

258260
In active mode, Microsoft Defender Antivirus is used as the antivirus app on the machine. Settings that are configured by using Configuration Manager, Group Policy, Microsoft Intune, or other management products apply. Files are scanned, threats are remediated, and detection information is reported in your configuration tool (such as in the Microsoft Intune admin center or the Microsoft Defender Antivirus app on the endpoint).
259261

260-
### Passive mode or EDR Block mode
262+
### Passive mode or EDR in block mode
261263

262264
In passive mode, Microsoft Defender Antivirus isn't used as the antivirus app, and threats aren't* remediated by Microsoft Defender Antivirus. However, [Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md) can remediate threats. Files are scanned by EDR, and reports are provided for threat detections that are shared with the Defender for Endpoint service. You might see alerts showing Microsoft Defender Antivirus as a source, even when Microsoft Defender Antivirus is in passive mode.
263265

@@ -271,11 +273,11 @@ When disabled or uninstalled, Microsoft Defender Antivirus isn't used as the ant
271273

272274
In cases where Microsoft Defender Antivirus is disabled automatically, it can be re-enabled automatically if the non-Microsoft antivirus/antimalware product expires, is uninstalled, or otherwise stops providing real-time protection from viruses, malware, or other threats. The automatic re-enabling of Microsoft Defender Antivirus helps to ensure that antivirus protection is maintained on your endpoints.
273275

274-
You might also use [limited periodic scanning](limited-periodic-scanning-microsoft-defender-antivirus.md), which works with the Microsoft Defender Antivirus engine to periodically check for threats if you're using a non-Microsoft antivirus app. |
276+
You might also use [limited periodic scanning](limited-periodic-scanning-microsoft-defender-antivirus.md), which works with the Microsoft Defender Antivirus engine to periodically check for threats if you're using a non-Microsoft antivirus app.
275277

276278
## What about non-Windows devices?
277279

278-
If you're looking for Antivirus related information for other platforms, see:
280+
If you're looking for Antivirus related information for other platforms, see:
279281

280282
- [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
281283
- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
@@ -289,6 +291,7 @@ You might also use [limited periodic scanning](limited-periodic-scanning-microso
289291

290292
- [Microsoft Defender Antivirus on Windows clients](microsoft-defender-antivirus-windows.md)
291293
- [EDR in block mode](edr-in-block-mode.md)
294+
292295
- [Learn about Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-learn-about)
293296
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
294297

0 commit comments

Comments
 (0)