You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/command-line-arguments-microsoft-defender-antivirus.md
+19-12Lines changed: 19 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.author: ewalsh
8
8
ms.custom: nextgen
9
9
ms.reviewer: ksarens
10
10
manager: deniseb
11
-
ms.date: 06/06/2023
11
+
ms.date: 01/16/2025
12
12
ms.subservice: ngp
13
13
ms.topic: how-to
14
14
ms.collection:
@@ -32,7 +32,7 @@ search.appverid: met150
32
32
You can perform various functions in Microsoft Defender Antivirus using the dedicated command-line tool **mpcmdrun.exe**. This utility is useful when you want to automate Microsoft Defender Antivirus tasks. You can find the utility in `%ProgramFiles%\Windows Defender\MpCmdRun.exe`. Run it from a command prompt.
33
33
34
34
> [!TIP]
35
-
> You might need to open an administrator-level version of the command prompt. When you search for **Command Prompt** on the Start menu, choose **Run as administrator**. If you're running an updated Microsoft Defender antimalware platform version, run `MpCmdRun` from the following location: `C:\ProgramData\Microsoft\Windows Defender\Platform\<antimalware platform version>`. For more information about the antimalware platform, see [Microsoft Defender Antivirus updates and baselines](microsoft-defender-antivirus-updates.md).
35
+
> You might need to open an administrator-level version of the command prompt. When you search for **Command Prompt** on the **Start** menu, choose **Run as administrator**. If you're running an updated Microsoft Defender antimalware platform version, run `MpCmdRun` from the following location: `C:\ProgramData\Microsoft\Windows Defender\Platform\<antimalware platform version>`. For more information about the antimalware platform, see [Microsoft Defender Antivirus updates and baselines](microsoft-defender-antivirus-updates.md).
36
36
37
37
The MpCmdRun utility uses the following syntax:
38
38
@@ -52,38 +52,45 @@ In our example, the MpCmdRun utility starts a full antivirus scan on the device.
52
52
53
53
|Command|Description|
54
54
|---|---|
55
-
|`-?`**or**`-h`|Displays all available options for the MpCmdRun tool|
55
+
|`-?`**or**`-h`|Displays all available options for the MpCmdRun tool.|
56
56
|`-Scan [-ScanType [<value>]] [-File <path> [-DisableRemediation] [-BootSectorScan] [-CpuThrottling]] [-Timeout <days>] [-Cancel]`|Scans for malicious software. Values for **ScanType** are:<p>**0** Default, according to your configuration<p>**1** Quick scan<p>**2** Full scan<p>**3** File and directory custom scan.<p>CpuThrottling runs according to policy configurations.|
|`-CaptureNetworkTrace -Path <path>`|Captures all the network input into the Network Protection service and saves it to a file at `<path>`. <br/>Supply an empty path to stop tracing.|
59
59
|`-GetFiles [-SupportLogLocation <path>]`|Collects support information. See [collecting diagnostic data](collect-diagnostic-data.md).|
60
60
|`-GetFilesDiagTrack`|Same as `-GetFiles`, but outputs to temporary DiagTrack folder.|
61
61
|`-RemoveDefinitions [-All]`|Restores the installed security intelligence to a previous backup copy or to the original default set.|
62
62
|`-RemoveDefinitions [-DynamicSignatures]`|Removes only the dynamically downloaded security intelligence.|
63
63
|`-RemoveDefinitions [-Engine]`|Restores the previous installed engine.|
64
-
|`-SignatureUpdate [-UNC \|-MMPC]`|Checks for new security intelligence updates.|
|`-CheckExclusion -path <path>`|Checks whether a path is excluded.|
70
+
|`-TDT [-on|-off|-default]`|Disable or Enable TDT feature or sets it to default. If no option is specified, it retrieves the current status.|
71
+
|`-OSCA`|Prints OS Copy Acceleration feature status.|
72
+
|`-DeviceControl -TestPolicyXml <FilePath> [-Rules | -Groups]`|Validate xml policy groups and rules.|
73
+
|`-TrustCheck -File <FilePath>`|Checks trust status of a file.|
70
74
|`-ValidateMapsConnection`|Verifies that your network can communicate with the Microsoft Defender Antivirus cloud service. This command will only work on Windows 10, version 1703 or higher.|
75
+
|`-ListCustomASR`|List the custom Azure Site Recovery rules present on this device.|
76
+
|`-DisplayECSConnection`|Displays URLs that Defender Core service uses to establish connection to ECS.|
77
+
|`-HeapSnapshotConfig <-Enable|-Disable> [-Pid <ProcessID>]`|Enable or Disable heap snapshot (tracing) configuration for process. Replace `<ProcessID>` with the actual process ID.|
71
78
|`-ResetPlatform`| Reset platform binaries back to `%ProgramFiles%\Windows Defender`.|
72
79
|`-RevertPlatform`| Revert platform binaries back to the previously installed version of the Defender platform.|
73
80
74
81
> [!NOTE]
75
-
> For the "Scan" command, the following are the default timeout values for Quick or Full scans where the scan will stop at that time by default.
76
-
> -Portal initiated scans (Quick or Full) or Windows Security app (Quick or Full): No time limit
77
-
> - Scheduled Full Scans or MpCmdRun -scan: 7 day limit
78
-
> - Scheduled Quick Scans or MpCmdRun -scan: 1 day limit
82
+
> For the `Scan` command, the following are the default time out values for Quick or Full scans where the scan will stop at that time by default.
83
+
> -Scheduled Full Scans or MpCmdRun -scan: Seven day limit
84
+
> - Scheduled Quick Scans or MpCmdRun -scan: One day limit
85
+
79
86
80
87
## Common errors in running commands via mpcmdrun.exe
81
88
82
89
The following table lists common errors that can occur while using the MpCmdRun tool.
83
90
84
91
|Error message|Possible reason|
85
92
|---|---|
86
-
|**ValidateMapsConnection failed (800106BA)** or **0x800106BA**|The Microsoft Defender Antivirus service is disabled. Enable the service and try again. If you need help re-enabling Microsoft Defender Antivirus, see [Reinstall/enable Microsoft Defender Antivirus on your endpoints](switch-to-mde-phase-2.md#step-1-reinstallenable-microsoft-defender-antivirus-on-your-endpoints).<p> Note that in Windows 10 1909 or older, and Windows Server 2019 or older, the service was formerly called *Windows Defender Antivirus*.|
93
+
|**ValidateMapsConnection failed (800106BA)** or **0x800106BA**|The Microsoft Defender Antivirus service is disabled. Enable the service and try again. If you need help re-enabling Microsoft Defender Antivirus, see [Reinstall/enable Microsoft Defender Antivirus on your endpoints](switch-to-mde-phase-2.md#step-1-reinstallenable-microsoft-defender-antivirus-on-your-endpoints).<p> In Windows 10 1909 or older, and Windows Server 2019 or older, the service was formerly called *Windows Defender Antivirus*.|
87
94
|**0x80070667**|You're running the `-ValidateMapsConnection` command from a computer that is Windows 10 version 1607 or older, or Windows Server 2016 or older. Run the command from a machine that is Windows 10 version 1703 or newer, or Windows Server 2019 or newer.|
88
95
|**MpCmdRun is not recognized as an internal or external command, operable program, or batch file.**|The tool must be run from either `%ProgramFiles%\Windows Defender` or `C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2012.4-0` (where `2012.4-0` might differ since platform updates are monthly except for March)|
89
96
|**ValidateMapsConnection failed to establish a connection to MAPS (hr=80070005 httpcode=450)**|The command was attempted using insufficient privileges. Use the command prompt (cmd.exe) as an administrator.|
@@ -98,7 +105,7 @@ The following table lists common errors that can occur while using the MpCmdRun
98
105
-[Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)
99
106
-[Configure Microsoft Defender Antivirus features](configure-microsoft-defender-antivirus-features.md)
100
107
-[Configure and validate Microsoft Defender Antivirus network connections](configure-network-connections-microsoft-defender-antivirus.md)
101
-
-[Reference topics for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)
108
+
-[Reference articles for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)
102
109
-[Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
103
110
-[macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
104
111
-[Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
Copy file name to clipboardExpand all lines: defender-office-365/mdo-email-entity-page.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ f1.keywords:
5
5
ms.author: chrisda
6
6
author: chrisda
7
7
manager: deniseb
8
-
ms.date: 4/12/2024
8
+
ms.date: 01/16/2025
9
9
audience: ITPro
10
10
ms.topic: conceptual
11
11
ms.service: defender-office-365
@@ -196,6 +196,7 @@ Use :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="fal
196
196
The **Analysis** view contains information that helps you analyze the message in depth. The following information is available in this view:
197
197
198
198
-**Threat detection details** section: Information about threats detected in the message:
199
+
-**Threat classification**: AI determination of the threat. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
199
200
-**Threats**: The primary threat is indicated by :::image type="icon" source="media/m365-cc-sc-primary-threat-icon.png" border="false"::: **Primary threat**.
200
201
-**Confidence level**: Values are **High**, **Medium**, or **Low**.
201
202
-**Priority account protection**: Values are **Yes** or **No**. For more information, see [Configure and review priority account protection in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).
@@ -511,6 +512,7 @@ The following sections are available on the Email summary panel for all features
Copy file name to clipboardExpand all lines: defender-office-365/threat-explorer-real-time-detections-about.md
+26-1Lines changed: 26 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: chrisda
7
7
manager: deniseb
8
8
audience: ITPro
9
9
ms.topic: conceptual
10
-
ms.date: 10/07/2024
10
+
ms.date: 01/15/2025
11
11
ms.localizationpriority: medium
12
12
ms.collection:
13
13
- m365-security
@@ -181,6 +181,7 @@ The filterable properties that are available in the **Delivery action** box in t
181
181
|Additional action|Select one or more values: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**: For more information, see [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**: The message was retroactively identified as good.</li><li>**ZAP**: For more information, see [Zero-hour auto purge (ZAP) in Microsoft Defender for Office 365](zero-hour-auto-purge.md).</li></ul>|
182
182
|Directionality|Select one or more values: <ul><li>**Inbound**</li><li>**Intra-org**</li><li>**Outbound**</li></ul>|
183
183
|Detection technology|Select one or more values: <ul><li>**Advanced filter**: Signals based on machine learning.</li><li>**Antimalware protection**</li><li>**Bulk**</li><li>**Campaign**</li><li>**Domain reputation**</li><li>**File detonation**: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.</li><li>**File detonation reputation**: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.</li><li>**File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.</li><li>**Fingerprint matching**: The message closely resembles a previous detected malicious message.</li><li>**General filter**</li><li>**Impersonation brand**: Sender impersonation of well-known brands.</li><li>**Impersonation domain**: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)</li><li>**Impersonation user**</li><li>**IP reputation**</li><li>**Mailbox intelligence impersonation**: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).</li><li>**Mixed analysis detection**: Multiple filters contributed to the message verdict.</li><li>**spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).</li><li>**Spoof external domain**: Sender email address spoofing using a domain that's external to your organization.</li><li>**Spoof intra-org**: Sender email address spoofing using a domain that's internal to your organization.</li><li>**URL detonation reputation**: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.</li><li>**URL malicious reputation**: The message contains a URL that was previously identified as malicious in other Microsoft 365 organizations.</li></ul>|
184
+
|Threat classification|Select one or more values: <ul><li>**Business inteligence**</li><li>**Contact establishment**</li><li>**Gift card**</li><li>**Invoice**</li><li>**Payroll**</li><li><**PII gathering**/li><li>**Task**</li></ul> For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).|
184
185
|Original delivery location|Select one or more values: <ul><li>**Deleted Items folder**</li><li>**Dropped**</li><li>**Failed**</li><li>**Inbox/folder**</li><li>**Junk folder**</li><li>**On-prem/external**</li><li>**Quarantine**</li><li>**Unknown**</li></ul>|
185
186
|Latest delivery location¹|Same values as **Original delivery location**</li></ul>|
186
187
|Phish confidence level|Select one or more values: <ul><li>**High**</li><li>**Normal**</li></ul>|
@@ -279,6 +280,12 @@ The **Detection technology** pivot organizes the chart by the feature that ident
279
280
280
281
Hovering over a data point in the chart shows the count for each detection technology.
281
282
283
+
#### Threat classification chart pivot in the All email view in Threat Explorer
284
+
285
+
The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
286
+
287
+
Hovering over a data point in the chart shows the count for each classification.
288
+
282
289
#### Full URL chart pivot in the All email view in Threat Explorer
283
290
284
291
The **Full URL** pivot organizes the chart by the full URLs in messages for the specified date/time range and property filters.
@@ -340,6 +347,7 @@ The **Email** view shows a details table. You can sort the entries by clicking o
340
347
-**Data loss prevention rule**
341
348
-**Threat type**<sup>\*</sup>
342
349
-**Detection technology**
350
+
-**Threat classification**
343
351
-**Attachment Count**
344
352
-**URL Count**
345
353
-**Email size**
@@ -681,6 +689,7 @@ The chart pivots that are available in the **Malware** view in Threat Explorer a
681
689
|**Sender domain**|✔||
682
690
|**Sender IP**|✔||
683
691
|**Delivery action**|✔|✔|
692
+
|**Threat classification**|✔|✔|
684
693
|**Detection technology**|✔|✔|
685
694
686
695
The available chart pivots are described in the following subsections.
@@ -721,6 +730,12 @@ The **Delivery action** pivot organizes the chart by what happened to messages t
721
730
722
731
Hovering over a data point in the chart shows the count for each delivery action.
723
732
733
+
#### Threat classification chart pivot in the Malware view in Threat Explorer and Real-time detections
734
+
735
+
The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
736
+
737
+
Hovering over a data point in the chart shows the count for each classification.
738
+
724
739
#### Detection technology chart pivot in the Malware view in Threat Explorer and Real-time detections
725
740
726
741
The **Detection technology** pivot organizes the chart by the feature that identified malware in messages for the specified date/time range and property filters.
@@ -778,6 +793,7 @@ The following table shows the columns that are available in Threat Explorer and
778
793
|**Data loss prevention rule**|✔|✔|
779
794
|**Threat type**<sup>\*</sup>|✔|✔|
780
795
|**Detection technology**|✔|✔|
796
+
|**Threat classification**|✔|✔|
781
797
|**Attachment Count**|✔|✔|
782
798
|**URL Count**|✔|✔|
783
799
|**Email size**|✔|✔|
@@ -895,6 +911,7 @@ The filterable properties that are available in the **Sender address** box in th
895
911
|Additional action|Select one or more values: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**</li><li>**ZAP**</li></ul>|✔|✔|
896
912
|Directionality|Select one or more values: <ul><li>**Inbound**</li><li>**Intra-org**</li><li>**Outbound**</li></ul>|✔|✔|
|Threat classification|Select one or more values: <ul><li>**Business inteligence**</li><li>**Contact establishment**</li><li>**Gift card**</li><li>**Invoice**</li><li>**Payroll**</li><li><**PII gathering**/li><li>**Task**</li></ul> For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).|✔|✔|
898
915
|Original delivery location|Select one or more values: <ul><li>**Deleted Items folder**</li><li>**Dropped**</li><li>**Failed**</li><li>**Inbox/folder**</li><li>**Junk folder**</li><li>**On-prem/external**</li><li>**Quarantine**</li><li>**Unknown**</li></ul>|✔|✔|
899
916
|Latest delivery location|Same values as **Original delivery location**</li></ul>|✔|✔|
900
917
|Phish confidence level|Select one or more values: <ul><li>**High**</li><li>**Normal**</li></ul>|✔||
@@ -947,6 +964,7 @@ The chart pivots that are available in the **Phish** view in Threat Explorer and
947
964
|**Sender IP**|✔||
948
965
|**Delivery action**|✔|✔|
949
966
|**Detection technology**|✔|✔|
967
+
|**Threat classification**|✔|✔|
950
968
|**Full URL**|✔||
951
969
|**URL domain**|✔|✔|
952
970
|**URL domain and path**|✔||
@@ -989,6 +1007,12 @@ The **Detection technology** pivot organizes the chart by the feature that ident
989
1007
990
1008
Hovering over a data point in the chart shows the count for each detection technology.
991
1009
1010
+
#### Threat classification chart pivot in the Phish view in Threat Explorer and Real-time detections
1011
+
1012
+
The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
1013
+
1014
+
Hovering over a data point in the chart shows the count for each classification.
1015
+
992
1016
#### Full URL chart pivot in the Phish view in Threat Explorer
993
1017
994
1018
The **Full URL** pivot organizes the chart by the full URLs in phishing messages for the specified date/time range and property filters.
@@ -1065,6 +1089,7 @@ The following table shows the columns that are available in Threat Explorer and
0 commit comments