|
| 1 | +--- |
| 2 | +title: Evaluate Microsoft Defender Antivirus using Group Policy |
| 3 | +description: Use this guide to evaluate and test the protection offered by Microsoft Defender Antivirus using Group Policy. |
| 4 | +ms.service: defender-endpoint |
| 5 | +ms.localizationpriority: medium |
| 6 | +ms.topic: conceptual |
| 7 | +author: deniseb |
| 8 | +ms.author: deniseb |
| 9 | +ms.custom: nextgen |
| 10 | +ms.date: 05/10/2024 |
| 11 | +ms.reviewer: |
| 12 | +manager: deniseb |
| 13 | +ms.subservice: ngp |
| 14 | +ms.collection: |
| 15 | +- m365-security |
| 16 | +- tier2 |
| 17 | +- mde-ngp |
| 18 | +search.appverid: met150 |
| 19 | +--- |
| 20 | + |
| 21 | +# Evaluate Microsoft Defender Antivirus using Group Policy |
| 22 | + |
| 23 | +[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)] |
| 24 | + |
| 25 | + |
| 26 | +**Applies to:** |
| 27 | + |
| 28 | +- Microsoft Defender Antivirus |
| 29 | +- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md) |
| 30 | +- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md) |
| 31 | + |
| 32 | +**Platforms** |
| 33 | + |
| 34 | +- Windows |
| 35 | + |
| 36 | +In Windows 10 or newer and Windows Server 2016 or newer, you can use next-generation protection features offered by Microsoft Defender Antivirus (MDAV) and Microsoft Defender Exploit Guard (Microsoft Defender EG). |
| 37 | + |
| 38 | +This topic explains how to enable and test the key protection features in Microsoft Defender AV and Microsoft Defender EG and provides you with guidance and links to more information. |
| 39 | + |
| 40 | +This article describes configuration options in Windows 10 or newer and Windows Server 2016 or newer. |
| 41 | + |
| 42 | +## Use Microsoft Defender Antivirus using Group Policy to enable the features |
| 43 | + |
| 44 | +This guide provides the Microsoft Defender Antivirus Group Policy that configures the features you should use to evaluate our protection. |
| 45 | + |
| 46 | +1. Grab the latest 'Windows Group Policy Administrative Templates'. |
| 47 | + |
| 48 | + For more information, see [Create and manage Central Store - Windows Client](/troubleshoot/windows-client/group-policy/create-and-manage-central-store#links-to-download-the-administrative-templates-files-based-on-the-operating-system-version). |
| 49 | + |
| 50 | + > [!TIP] |
| 51 | + > 1. The Windows one works with the Windows Servers. |
| 52 | + > |
| 53 | + > 1. Even if you are running a Windows 10 or Windows Server 2016, get the latest administrative templates for Windows 11 or newer. |
| 54 | +
|
| 55 | + |
| 56 | +2. Create a 'Central Store' to host the latest .admx and .adml templates. |
| 57 | + |
| 58 | + For more information, see [Create and manage Central Store - Windows Client](/troubleshoot/windows-client/group-policy/create-and-manage-central-store#the-central-store). |
| 59 | + |
| 60 | + If joined to a domain: |
| 61 | + |
| 62 | + 1. Create a new OU block policy inheritance. |
| 63 | + |
| 64 | + 1. Open Group policy Management Console (GPMC.msc). |
| 65 | + |
| 66 | + 1. Go to **Group Policy Objects** and create a new Group Policy. |
| 67 | + |
| 68 | + 1. Right-click the new policy created and select **Edit**. |
| 69 | + |
| 70 | + 1. Navigate to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**. |
| 71 | + |
| 72 | + or |
| 73 | + |
| 74 | + If joined to a workgroup |
| 75 | + |
| 76 | + 1. Open Group Policy Editor MMC (GPEdit.msc). |
| 77 | + |
| 78 | + 2. Navigate to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**. |
| 79 | + |
| 80 | +## MDAV and Potentially Unwanted Applications (PUA) |
| 81 | + |
| 82 | +**Root:** |
| 83 | + |
| 84 | +| Description | Setting | |
| 85 | +| --- | --- | |
| 86 | +| Turn off Microsoft Defender Antivirus | Disabled | |
| 87 | +| Configure detection for potentially unwanted applications | Enabled - Block | |
| 88 | + |
| 89 | +## Real-time protection (always-on protection, real-time scanning) |
| 90 | + |
| 91 | +\\**Real-time protection:** |
| 92 | + |
| 93 | +| Description | Setting | |
| 94 | +| --- | --- | |
| 95 | +| Turn off real-time protection | Disabled | |
| 96 | +| Configure monitoring for incoming and outgoing file and program activity | Enabled, bi-directional (full on-access) | |
| 97 | +| Turn on Behavior Monitoring | Enabled | |
| 98 | +| Monitor file and program activity on your computer | Enabled | |
| 99 | + |
| 100 | +## Cloud protection features |
| 101 | + |
| 102 | +Standard security intelligence updates can take hours to prepare and deliver; our cloud-delivered protection service can deliver this protection in seconds. |
| 103 | + |
| 104 | +For more information, see [Use next-gen technologies in Microsoft Defender Antivirus through cloud-delivered protection](/windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus). |
| 105 | + |
| 106 | +\\**MAPS:** |
| 107 | + |
| 108 | +| Description | Setting | |
| 109 | +| --- | --- | |
| 110 | +| Join Microsoft MAPS | Enabled, Advanced MAPS | |
| 111 | +| Configure the ‘Block at First Sight’ feature | Enabled | |
| 112 | +| Send file samples when further analysis is required | Enabled, Send all samples | |
| 113 | + |
| 114 | +\\**MpEngine:** |
| 115 | + |
| 116 | +| Description | Setting | |
| 117 | +| --- | --- | |
| 118 | +| Select cloud protection level | Enabled, High blocking level | |
| 119 | +| Configure extended cloud check | Enabled, 50 | |
| 120 | + |
| 121 | +## Scans |
| 122 | + |
| 123 | +| Description | Setting | |
| 124 | +| --- | --- | |
| 125 | +| Turn on Heuristics | Enabled | |
| 126 | +| Turn on e-mail scanning | Enabled | |
| 127 | +| Scan all downloaded files and attachments | Enabled | |
| 128 | +| Turn on script scanning | Enabled | |
| 129 | +| Scan archive files | Enabled | |
| 130 | +| Scan packed executables | Enabled | |
| 131 | +| Configure scanning of network files (Scan Network Files) | Enabled | |
| 132 | +| Scan removable drives | Enabled | |
| 133 | +| Turn on reparse point scanning | Enabled | |
| 134 | + |
| 135 | +## Security Intelligence updates |
| 136 | + |
| 137 | +| Description | Setting | |
| 138 | +| --- | --- | |
| 139 | +| Specify the interval to check for security intelligence updates | Enabled, 4 | |
| 140 | +| Define the order of sources for downloading security intelligence updates | Enabled, under 'Define the order of sources for downloading security intelligence updates'<br><br>InternalDefinitionUpdateServer \| MicrosoftUpdateServer \| MMPC<br><br>**Note:** Where InternalDefinitionUpdateServer is WSUS with Microsoft Defender Antivirus updates allowed.<br><br>MicrosoftUpdateServer == Microsoft Update (formerly Windows Update).<br><br>MMPC == https://www.microsoft.com/en-us/wdsi/definitions | |
| 141 | + |
| 142 | +## Disable local administrator AV settings |
| 143 | + |
| 144 | +Disable local administrator AV settings such as exclusions, and enforce the policies from the Microsoft Defender for Endpoint Security Settings Management. |
| 145 | + |
| 146 | +**Root:** |
| 147 | + |
| 148 | +| Description | Setting | |
| 149 | +| --- | --- | |
| 150 | +| Configure local administrator merge behavior for lists | Disabled | |
| 151 | +| Control whether or not exclusions are visible to local admins | Enabled | |
| 152 | + |
| 153 | +## Threat Severity Default Action |
| 154 | + |
| 155 | +\\**Threats** |
| 156 | + |
| 157 | +| Description | Setting | Alert level | Action | |
| 158 | +| --- | --- | --- | --- | |
| 159 | +| Specify threat alert levels at which default action shouldn't be taken when detected | Enabled | | | |
| 160 | +| | | 5 (Severe) | 2 (Quarantine) | |
| 161 | +| | | 4 (High) | 2 (Quarantine) | |
| 162 | +| | | 2 (Medium) | 2 (Quarantine) | |
| 163 | +| | | 1 (Low) | 2 (Quarantine) | |
| 164 | + |
| 165 | +\\**Quarantine** |
| 166 | + |
| 167 | +| Description | Setting | |
| 168 | +| --- | --- | |
| 169 | +| Configure removal of items from Quarantine folder | Enabled, 60 | |
| 170 | + |
| 171 | +\\**Client Interface** |
| 172 | + |
| 173 | +| Description | Setting | |
| 174 | +| --- | --- | |
| 175 | +| Enable headless UI mode | Disabled | |
| 176 | + |
| 177 | +## Network Protection |
| 178 | + |
| 179 | +\\**Microsoft Defender Exploit Guard\\Network Protection:** |
| 180 | + |
| 181 | +| Description | Setting | |
| 182 | +| --- | --- | |
| 183 | +| Prevent users and apps from accessing dangerous websites | Enabled, Block | |
| 184 | +| This settings controls whether Network Protection is allowed to be configured into block or audit mode on Windows Server | Enabled | |
| 185 | +| Allow Network Protection Down Level | Network protection is enabled downlevel | |
| 186 | +| Allow Datagram Processing On Win Server | Datagram processing on Windows Server is enabled | |
| 187 | +| Disable DNS over TCP parsing | DNS over TCP parsing is enabled | |
| 188 | +| Disable HTTP parsing | HTTP parsing is enabled | |
| 189 | +| Disable SSH parsing | SSH parsing is enabled | |
| 190 | +| Disable TLS parsing | TLS parsing is enabled | |
| 191 | +| Enable DNS Sinkhole | DNS Sinkhole is enabled | |
| 192 | + |
| 193 | + |
| 194 | +## Attack Surface Reduction Rules |
| 195 | + |
| 196 | +1. Navigate to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Microsoft Defender Exploit Guard** > **Attack Surface Reduction**. |
| 197 | + |
| 198 | +2. Select **Next**. |
| 199 | + |
| 200 | +| Description | Setting | |
| 201 | +| --- | --- | |
| 202 | +| be9ba2d9-53ea-4cdc-84e5-9b1eeee46550<br><br>**Note:** (Block executable content from email client and webmail) | 1 (Block) | |
| 203 | +| 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c<br><br>**Note:** (Block Adobe Reader from creating child processes) | 1 (Block) | |
| 204 | +| 5beb7efe-fd9a-4556-801d-275e5ffc04cc<br><br>**Note:** (Block execution of potentially obfuscated scripts) | 1 (Block) | |
| 205 | +| 56a863a9-875e-4185-98a7-b882c64b5ce5<br><br>**Note:** (Block abuse of exploited vulnerable signed drivers) | 1 (Block) | |
| 206 | +| 92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b<br><br>**Note:** (Block Win32 API calls from Office macros) | 1 (Block) | |
| 207 | +| 01443614-cd74-433a-b99e-2ecdc07bfc25<br><br>**Note:** (Block executable files from running unless they meet a prevalence, age, or trusted list criterion) | 1 (Block) | |
| 208 | +| 26190899-1602-49e8-8b27-eb1d0a1ce869<br><br>**Note:** (Block Office communication application from creating child processes) | 1 (Block) | |
| 209 | +| d4f940ab-401b-4efc-aadc-ad5f3c50688a<br><br>**Note:** (Block all Office applications from creating child processes) | 1 (Block) | |
| 210 | +| c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb<br><br>**Note:** ( \[PREVIEW\] Block use of copied or impersonated system tools) | 1 (Block) | |
| 211 | +| d3e037e1-3eb8-44c8-a917-57927947596d<br><br>**Note:** (Block JavaScript or VBScript from launching downloaded executable content) | 1 (Block) | |
| 212 | +| 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2<br><br>**Note:** (Block credential stealing from the Windows local security authority subsystem) | 1 (Block) | |
| 213 | +| a8f5898e-1dc8-49a9-9878-85004b8a61e6<br><br>**Note:** (Block Webshell creation for Servers) | 1 (Block) | |
| 214 | +| 3b576869-a4ec-4529-8536-b80a7769e899<br><br>**Note:** (Block Office applications from creating executable content) | 1 (Block) | |
| 215 | +| b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4<br><br>**Note:** (Block untrusted and unsigned processes that run from USB) | 1 (Block) | |
| 216 | +| 75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84<br><br>**Note:** (Block Office applications from injecting code into other processes) | 1 (Block) | |
| 217 | +| e6db77e5-3df2-4cf1-b95a-636979351e5b<br><br>**Note:** (Block persistence through WMI event subscription) | 1 (Block) | |
| 218 | +| c1db55ab-c21a-4637-bb3f-a12568109d35<br><br>**Note:** (Use advanced protection against ransomware) | 1 (Block) | |
| 219 | +| d1e49aac-8f56-4280-b9ba-993a6d77406c<br><br>**Note:** (Block process creations originating from PSExec and WMI commands) | 1 (Block)<br><br>**Note:** If you have Configuration Manager (formerly SCCM), or other management tools that use WMI, you might need to set this to 2 (‘audit’) instead of 1(‘block’). | |
| 220 | +| 33ddedf1-c6e0-47cb-833e-de6133960387<br><br>**Note:** ( \[PREVIEW\] Block rebooting machine in Safe Mode) | 1 (Block) | |
| 221 | + |
| 222 | +> [!TIP] |
| 223 | +> Some rules may block behavior you find acceptable in your organization. In these cases, change the rule from 'Enabled' to 'Audit' to prevent unwanted blocks. |
| 224 | +
|
| 225 | +## Controlled Folder Access |
| 226 | + |
| 227 | +Navigate to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Microsoft Defender Exploit Guard** > **Attack Surface Reduction**. |
| 228 | + |
| 229 | +| Description | Setting | |
| 230 | +| --- | --- | |
| 231 | +| Configure Controlled Folder Access | Enabled, Block | |
| 232 | + |
| 233 | +Assign the policies to the OU where the test machines are located. |
| 234 | + |
| 235 | +## Check the Platform Update version |
| 236 | + |
| 237 | +The latest 'Platform Update' version Production channel (GA) is available here: |
| 238 | + |
| 239 | +[Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623+update) |
| 240 | + |
| 241 | +To check which 'Platform Update' version you have installed, use the following PowerShell command (Run as admin): |
| 242 | + |
| 243 | +```powershell |
| 244 | +get-mpComputerStatus | ft AMProductVersion |
| 245 | +``` |
| 246 | + |
| 247 | +## Check the Security Intelligence Update version |
| 248 | + |
| 249 | +The latest 'Security Intelligence Update' version is available here: |
| 250 | + |
| 251 | +[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates) |
| 252 | + |
| 253 | +To check which 'Security Intelligence Update' version you have installed, use the following PowerShell command (Run as admin): |
| 254 | + |
| 255 | +```PowerShell |
| 256 | +get-mpComputerStatus | ft AntivirusSignatureVersion |
| 257 | +``` |
| 258 | + |
| 259 | +## Check the Engine Update version |
| 260 | + |
| 261 | +The latest scan 'engine update' version is available here: |
| 262 | + |
| 263 | +[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates) |
| 264 | + |
| 265 | +To check which 'Engine Update' version you have installed, use the following PowerShell command(Run as admin): |
| 266 | + |
| 267 | +```PowerShell |
| 268 | +get-mpComputerStatus | ft AMEngineVersion |
| 269 | +``` |
| 270 | + |
| 271 | +If you're finding that your settings aren't taking effect, you might have a conflict. To resolve conflicts, refer: |
| 272 | +[Troubleshoot Microsoft Defender Antivirus settings](troubleshoot-settings.md). |
| 273 | + |
| 274 | +## For False Negatives (FNs) submissions |
| 275 | + |
| 276 | +If you have any questions about a detection that Microsoft Defender AV makes, or you discover a missed detection, you can submit a file to us. |
| 277 | + |
| 278 | +If you have Microsoft XDR, Microsoft Defender for Endpoint P2/P1, or Microsoft Defender for Business: refer [Submit files in Microsoft Defender for Endpoint](admin-submissions-mde.md). |
| 279 | + |
| 280 | +If you have Microsoft Defender Antivirus, refer: |
| 281 | +https://www.microsoft.com/security/portal/mmpc/help/submission-help.aspx |
| 282 | + |
| 283 | +Microsoft Defender AV indicates a detection through [standard Windows notifications](configure-notifications-microsoft-defender-antivirus.md). You can also [review detections in the Microsoft Defender AV app](review-scan-results-microsoft-defender-antivirus.md). |
| 284 | + |
| 285 | +The Windows event log also records detection and engine events. See the [Microsoft Defender Antivirus events article for a list of event IDs](troubleshoot-microsoft-defender-antivirus.yml) and their corresponding actions. |
| 286 | + |
| 287 | +If your settings aren't applied properly, find out if there are conflicting policies that are enabled in your environment. For more information, see [Troubleshoot Microsoft Defender Antivirus settings](troubleshoot-settings.md). |
| 288 | + |
| 289 | +If you need to open a Microsoft support case: |
| 290 | +[Contact Microsoft Defender for Endpoint support](contact-support.md). |
0 commit comments