Skip to content

Commit ecb17c7

Browse files
committed
Update microsoft-defender-antivirus-using-powershell.md
1 parent 7d83386 commit ecb17c7

File tree

1 file changed

+19
-19
lines changed

1 file changed

+19
-19
lines changed

defender-endpoint/microsoft-defender-antivirus-using-powershell.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -65,12 +65,12 @@ More details are available in [Use next-gen technologies in Microsoft Defender A
6565

6666
| Description | PowerShell Command |
6767
|---|---|
68-
|Enable the Microsoft Defender Cloud for near-instant protection and increased protection|Set-MpPreference -MAPSReporting Advanced|
69-
|Automatically submit samples to increase group protection|Set-MpPreference -SubmitSamplesConsent Always|
70-
|Always Use the cloud to block new malware within seconds|Set-MpPreference -DisableBlockAtFirstSeen 0|
71-
|Scan all downloaded files and attachments|Set-MpPreference -DisableIOAVProtection 0|
72-
|Set cloud block level to 'High'|Set-MpPreference -CloudBlockLevel High|
73-
|High Set cloud block time-out to 1 minute|Set-MpPreference -CloudExtendedTimeout 50|
68+
|Enable the Microsoft Defender Cloud for near-instant protection and increased protection|`Set-MpPreference -MAPSReporting Advanced`|
69+
|Automatically submit samples to increase group protection|`Set-MpPreference -SubmitSamplesConsent Always`|
70+
|Always Use the cloud to block new malware within seconds|`Set-MpPreference -DisableBlockAtFirstSeen 0`|
71+
|Scan all downloaded files and attachments|`Set-MpPreference -DisableIOAVProtection 0`|
72+
|Set cloud block level to 'High'|`Set-MpPreference -CloudBlockLevel High`|
73+
|High Set cloud block time-out to 1 minute|`Set-MpPreference -CloudExtendedTimeout 50`|
7474

7575
## Always-on protection (real-time scanning)
7676

@@ -80,18 +80,18 @@ For more details on these options, see [Configure behavioral, heuristic, and rea
8080

8181
| Description | PowerShell Command |
8282
|---|---|
83-
|Constantly monitor files and processes for known malware modifications | Set-MpPreference -DisableRealtimeMonitoring 0 |
84-
|Constantly monitor for known malware behaviors – even in 'clean' files and running programs | Set-MpPreference -DisableBehaviorMonitoring 0 |
85-
|Scan scripts as soon as they're seen or run | Set-MpPreference -DisableScriptScanning 0 |
86-
|Scan removable drives as soon as they're inserted or mounted | Set-MpPreference -DisableRemovableDriveScanning 0 |
83+
|Constantly monitor files and processes for known malware modifications | `Set-MpPreference -DisableRealtimeMonitoring 0` |
84+
|Constantly monitor for known malware behaviors – even in 'clean' files and running programs | `Set-MpPreference -DisableBehaviorMonitoring 0` |
85+
|Scan scripts as soon as they're seen or run | `Set-MpPreference -DisableScriptScanning 0` |
86+
|Scan removable drives as soon as they're inserted or mounted | `Set-MpPreference -DisableRemovableDriveScanning 0` |
8787

8888
## Potentially Unwanted Application protection
8989

9090
[Potentially unwanted applications](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) are files and apps that aren't traditionally classified as malicious. These include non-Microsoft installers for common software, ad-injection, and certain types of toolbars in your browser.
9191

9292
| Description | PowerShell Command |
9393
|---|---|
94-
|Prevent grayware, adware, and other potentially unwanted apps from installing|Set-MpPreference -PUAProtection Enabled|
94+
|Prevent grayware, adware, and other potentially unwanted apps from installing|`Set-MpPreference -PUAProtection Enabled`|
9595

9696
## Email and archive scanning
9797

@@ -100,29 +100,29 @@ You can set Microsoft Defender Antivirus to automatically scan certain types of
100100

101101
| Description | PowerShell Command |
102102
|---|---|
103-
|Scan email files and archives|Set-MpPreference -DisableArchiveScanning 0 </br> Set-MpPreference -DisableEmailScanning 0|
103+
|Scan email files and archives|`Set-MpPreference -DisableArchiveScanning 0` </br> `Set-MpPreference -DisableEmailScanning 0`|
104104

105105
## Manage product and protection updates
106106

107107
Typically, you receive Microsoft Defender Antivirus updates from Windows update once per day. However, you can increase the frequency of those updates by setting the following options, and [ensuring that your updates are managed either in System Center Configuration Manager, with Group Policy, or in Intune](deploy-manage-report-microsoft-defender-antivirus.md).
108108

109109
| Description | PowerShell Command |
110110
|---|---|
111-
|Update signatures every day|Set-MpPreference -SignatureUpdateInterval|
112-
|Check to update signatures before running a scheduled scan|Set-MpPreference -CheckForSignaturesBeforeRunningScan 1|
111+
|Update signatures every day|`Set-MpPreference -SignatureUpdateInterval`|
112+
|Check to update signatures before running a scheduled scan|`Set-MpPreference -CheckForSignaturesBeforeRunningScan 1`|
113113

114114
## Advanced threat and exploit mitigation and prevention Controlled folder access
115115

116116
Microsoft Defender exploit protection provides features that help protect devices from known malicious behaviors and attacks on vulnerable technologies.
117117

118118
| Description | PowerShell Command |
119119
|---|---|
120-
|Prevent malicious and suspicious apps (such as ransomware) from making changes to protected folders with Controlled folder access|Set-MpPreference -EnableControlledFolderAccess Enabled|
121-
|Block connections to known bad IP addresses and other network connections with [Network protection](network-protection.md)|Set-MpPreference -EnableNetworkProtection Enabled|
122-
|Apply a standard set of mitigations with [Exploit protection](exploit-protection.md)|Invoke-WebRequest </br> https://demo.wd.microsoft.com/Content/ProcessMitigation.xml -OutFile ProcessMitigation.xml </br >Set-ProcessMitigation -PolicyFilePath ProcessMitigation.xml|
123-
|Block known malicious attack vectors with [Attack surface reduction](attack-surface-reduction.md)|Add-MpPreference -AttackSurfaceReductionRules\_Ids 56a863a9-875e-4185-98a7-b882c64b5ce5 -AttackSurfaceReductionRules\_Actions Enabled </br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids D4F940AB-401B-4EfC-AADCAD5F3C50688A -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids BE9BA2D9-53EA-4CDC-84E5- 9B1EEEE46550 -AttackSurfaceReductionRules\_Actions Enabled </br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 01443614-CD74-433A-B99E2ECDC07BFC25 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 5BEB7EFE-FD9A-4556801D275E5FFC04CC -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids D3E037E1-3EB8-44C8-A917- 57927947596D -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 3B576869-A4EC-4529-8536- B80A7769E899 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 75668C1F-73B5-4CF0-BB93- 3ECF5CB7CC84 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 26190899-1602-49e8-8b27-eb1d0a1ce869 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids e6db77e5-3df2-4cf1-b95a-636979351e5b -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids D1E49AAC-8F56-4280-B9BA993A6D77406C -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 33ddedf1-c6e0-47cb-833e-de6133960387 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids B2B3F03D-6A65-4F7B-A9C7- 1C7EF74A9BA4 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids a8f5898e-1dc8-49a9-9878-85004b8a61e6 -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids 92E97FA1-2EDF-4476-BDD6- 9DD0B4DDDC7B -AttackSurfaceReductionRules\_Actions Enabled</br>Add-MpPreference -AttackSurfaceReductionRules\_Ids C1DB55AB-C21A-4637-BB3FA12568109D35 -AttackSurfaceReductionRules\_Actions Enabled|
120+
|Prevent malicious and suspicious apps (such as ransomware) from making changes to protected folders with Controlled folder access|`Set-MpPreference -EnableControlledFolderAccess Enabled`|
121+
|Block connections to known bad IP addresses and other network connections with [Network protection](network-protection.md)|`Set-MpPreference -EnableNetworkProtection Enabled`|
122+
|Apply a standard set of mitigations with [Exploit protection](exploit-protection.md)|`Invoke-WebRequest` <br/> `https://demo.wd.microsoft.com/Content/ProcessMitigation.xml -OutFile ProcessMitigation.xml` <br/>`Set-ProcessMitigation -PolicyFilePath ProcessMitigation.xml`|
123+
|Block known malicious attack vectors with [Attack surface reduction](attack-surface-reduction.md)|`Add-MpPreference -AttackSurfaceReductionRules\_Ids 56a863a9-875e-4185-98a7-b882c64b5ce5 -AttackSurfaceReductionRules\_Actions Enabled` <br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c -AttackSurfaceReductionRules\_Actions Enabled`<br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids D4F940AB-401B-4EfC-AADCAD5F3C50688A -AttackSurfaceReductionRules\_Actions Enabled`<br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 -AttackSurfaceReductionRules\_Actions Enabled`<br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids BE9BA2D9-53EA-4CDC-84E5- 9B1EEEE46550 -AttackSurfaceReductionRules\_Actions Enabled` <br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids 01443614-CD74-433A-B99E2ECDC07BFC25 -AttackSurfaceReductionRules\_Actions Enabled`<br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids 5BEB7EFE-FD9A-4556801D275E5FFC04CC -AttackSurfaceReductionRules\_Actions Enabled`<br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids D3E037E1-3EB8-44C8-A917- 57927947596D -AttackSurfaceReductionRules\_Actions Enabled`<br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids 3B576869-A4EC-4529-8536- B80A7769E899 -AttackSurfaceReductionRules\_Actions Enabled`<br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids 75668C1F-73B5-4CF0-BB93- 3ECF5CB7CC84 -AttackSurfaceReductionRules\_Actions Enabled`<br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids 26190899-1602-49e8-8b27-eb1d0a1ce869 -AttackSurfaceReductionRules\_Actions Enabled`<br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids e6db77e5-3df2-4cf1-b95a-636979351e5b -AttackSurfaceReductionRules\_Actions Enabled`<br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids D1E49AAC-8F56-4280-B9BA993A6D77406C -AttackSurfaceReductionRules\_Actions Enabled`<br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids 33ddedf1-c6e0-47cb-833e-de6133960387 -AttackSurfaceReductionRules\_Actions Enabled`<br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids B2B3F03D-6A65-4F7B-A9C7- 1C7EF74A9BA4 -AttackSurfaceReductionRules\_Actions Enabled`<br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb -AttackSurfaceReductionRules\_Actions Enabled`<br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids a8f5898e-1dc8-49a9-9878-85004b8a61e6 -AttackSurfaceReductionRules\_Actions Enabled`<br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids 92E97FA1-2EDF-4476-BDD6- 9DD0B4DDDC7B -AttackSurfaceReductionRules\_Actions Enabled`<br/>`Add-MpPreference -AttackSurfaceReductionRules\_Ids C1DB55AB-C21A-4637-BB3FA12568109D35 -AttackSurfaceReductionRules\_Actions Enabled`|
124124

125-
Some rules might block behavior you find acceptable in your organization. In these cases, change the rule from Enabled to Audit to prevent unwanted blocks.
125+
Some rules might block behavior you find acceptable in your organization. In these cases, change the rule from `Enabled` to `Audit` to prevent unwanted blocks.
126126

127127
#### Enable Tamper Protection
128128

0 commit comments

Comments
 (0)