|
| 1 | +--- |
| 2 | +title: Defender for Endpoint with Defender Antivirus in passive mode |
| 3 | +ms.topic: conceptual |
| 4 | +description: Understand how Defender Antivirus in passive mode works and when to use it. |
| 5 | +ms.service: defender-endpoint |
| 6 | +author: KesemSharabi |
| 7 | +ms.author: kesharab |
| 8 | +ms.localizationpriority: high |
| 9 | +audience: ITPro |
| 10 | +ms.collection: |
| 11 | +- m365-security |
| 12 | +- tier1 |
| 13 | +- mde-ngp |
| 14 | +ms.subservice: ngp |
| 15 | +search.appverid: met150 |
| 16 | +ms.date: 03/26/2025 |
| 17 | +--- |
| 18 | + |
| 19 | +# Defender Antivirus in passive mode |
| 20 | + |
| 21 | +[!INCLUDE [side-by-side-scenarios](includes/side-by-side-scenarios.md)] |
| 22 | + |
| 23 | +Microsoft Defender for Endpoint is a comprehensive security solution designed to protect your devices from evolving threats. One of its key features enables Microsoft Defender Antivirus to coexist with non-Microsoft antimalware solutions while still providing valuable endpoint detection and response capabilities. |
| 24 | + |
| 25 | +Some of the key benefits of Defender Antivirus in passive mode are: |
| 26 | + |
| 27 | +* **EDR Block mode** - Post-breach protection by detecting and remediating threats missed by the active antimalware solution |
| 28 | + |
| 29 | +* **Data Loss Prevention (DLP)** - Endpoint DLP functionalities operate normally, ensuring sensitive data is safeguarded. |
| 30 | + |
| 31 | +* **Security intelligence updates** - Microsoft Defender Antivirus continues to receive updates to stay aware of the latest threats. |
| 32 | + |
| 33 | +* **Data Loss Prevention (DLP)** - Endpoint DLP functionalities operate normally, ensuring sensitive data is safeguarded. |
| 34 | + |
| 35 | +For more information, see [How Microsoft Defender Antivirus affects Defender for Endpoint functionality](microsoft-defender-antivirus-compatibility.md#how-microsoft-defender-antivirus-affects-defender-for-endpoint-functionality). |
| 36 | + |
| 37 | +>[!NOTE] |
| 38 | +>Passive mode disables Microsoft Defender Antivirus scheduled scans unless specific configurations are applied. |
| 39 | +
|
| 40 | +## Prerequisites |
| 41 | + |
| 42 | +* Operating system |
| 43 | + * Windows 10 or newer |
| 44 | + * Windows Server 2012 R2 or newer |
| 45 | + |
| 46 | +* The device must be onboarded to Microsoft Defender for Endpoint |
| 47 | + |
| 48 | +* Microsoft Defender Antivirus has to be installed and enabled |
| 49 | + |
| 50 | +## Configure passive mode |
| 51 | + |
| 52 | +On Windows 10 or newer, Defender Antivirus automatically enters passive mode when a non-Microsoft antimalware solution is installed and registered. |
| 53 | + |
| 54 | +For Windows Server operating systems, follow the instructions in this section to configure passive mode for Microsoft Defender for Endpoint. |
| 55 | + |
| 56 | +### Set the registry key |
| 57 | + |
| 58 | +To avoid conflicts between Microsoft Defender Antivirus and a third-party antivirus solution, if you're using Windows Server, set the following registry key before onboarding the device to Microsoft Defender for Endpoint: |
| 59 | + |
| 60 | +* **Path** - HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection |
| 61 | + |
| 62 | +* **Name** - ForceDefenderPassiveMode |
| 63 | + |
| 64 | +* **Type** - REG_DWORD |
| 65 | + |
| 66 | +* **Value** - 1 |
| 67 | + |
| 68 | +### Enable EDR in block mode |
| 69 | + |
| 70 | +When Microsoft Defender Antivirus is in passive mode, EDR in block mode can provide post-breach protection by detecting and remediating threats. Ensure this feature is enabled in Defender for Endpoint. |
| 71 | + |
| 72 | +### Avoid service modifications |
| 73 | + |
| 74 | +Don't disable, stop, or modify associated services such as `wscsvc`, `WinDefend`, or `MsMpEng`. Stopping these services can cause instability and make your device vulnerable to threats. |
| 75 | + |
| 76 | +### Exclude Defender binaries in third-party antivirus |
| 77 | + |
| 78 | +To prevent performance issues or conflicts, add Microsoft Defender Antivirus and Defender for Endpoint binaries to the exclusion list of your third-party antivirus solution. |
| 79 | + |
| 80 | +## Verify that passive mode is enabled |
| 81 | + |
| 82 | +This section describes how to confirm whether Microsoft Defender Antivirus is in passive mode. |
| 83 | + |
| 84 | +### Windows PowerShell |
| 85 | + |
| 86 | +Run the following PowerShell cmdlet: |
| 87 | + |
| 88 | +```powershell |
| 89 | +Get-MpComputerStatus | select AMRunningMode |
| 90 | +``` |
| 91 | + |
| 92 | +The `AMRunningMode` value indicates the current Defender Antivirus state: |
| 93 | + |
| 94 | +* **Normal** - Active mode |
| 95 | + |
| 96 | +* **Passive** - Passive mode |
| 97 | + |
| 98 | +* **EDR Block Mode** - EDR is operating in block mode |
| 99 | + |
| 100 | +### Windows security app |
| 101 | + |
| 102 | +Follow these steps to verify that Microsoft Defender Antivirus is in passive mode (Windows 10 and later only). |
| 103 | + |
| 104 | +1. Open the Windows Security app. |
| 105 | + |
| 106 | +2. Select **Virus & threat protection**. |
| 107 | + |
| 108 | +3. Under **Who’s protecting me?**, select **Manage providers**. |
| 109 | + |
| 110 | +4. On the *Security providers* page, verify the antivirus provider and state. |
| 111 | + |
| 112 | +## Additional resources |
| 113 | + |
| 114 | +[Microsoft Defender Antivirus compatibility with other security products](microsoft-defender-antivirus-compatibility.md) |
0 commit comments