You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-antivirus-on-windows-server.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.author: ewalsh
9
9
ms.reviewer: pahuijbr
10
10
manager: deniseb
11
11
ms.topic: conceptual
12
-
ms.date: 03/14/2025
12
+
ms.date: 03/18/2025
13
13
ms.collection:
14
14
- m365-security
15
15
- tier2
@@ -52,7 +52,7 @@ The process of setting up and running Microsoft Defender Antivirus on Windows Se
52
52
## Enable the user interface on Windows Server
53
53
54
54
> [!IMPORTANT]
55
-
> If you're using Windows Server 2012 R2, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages).
55
+
> If you're using Windows Server 2012 R2, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-defender-for-endpoint-packages).
56
56
57
57
By default, Microsoft Defender Antivirus is installed and functional on Windows Server. Sometimes, the user interface (GUI) is installed by default. The GUI isn't required; you can use PowerShell, Group Policy, or other methods to manage Microsoft Defender Antivirus. However, many organizations prefer to use the GUI for Microsoft Defender Antivirus. To install the GUI, use one of the procedures in the following table:
58
58
@@ -188,7 +188,7 @@ For more information, see [Working with Registry Keys](/powershell/scripting/sam
188
188
189
189
If your Windows Server is onboarded to Microsoft Defender for Endpoint, you can run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and Windows Server 2016. See the following articles:
190
190
191
-
-[Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages)
191
+
-[Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-defender-for-endpoint-packages)
192
192
193
193
-[Microsoft Defender Antivirus compatibility with other security products](microsoft-defender-antivirus-compatibility.md)
- Microsoft Defender for Endpoint for servers Plan 1 or Plan 2
28
+
- Microsoft Defender for Servers Plan 1 or Plan 2
29
+
- Microsoft Defender for Business
30
+
- Microsoft Defender Vulnerability Management
31
+
- Microsoft Defender XDR
32
32
33
33
**Platforms**
34
34
@@ -38,8 +38,8 @@ ms.date: 03/14/2025
38
38
- Windows Server 2019
39
39
- Windows Server 2016
40
40
- Windows Server 2012 R2
41
-
- Mac
42
-
- Linux Server
41
+
- Mac devices
42
+
- Linux servers
43
43
44
44
When you offboard a device from Defender for Endpoint, no new detections, vulnerability, or security data are sent to the Microsoft Defender portal. Seven days after offboarding a device, its status changes to [inactive](/defender-endpoint/fix-unhealthy-sensors#inactive-devices). Devices that weren't active within the past 30 days are not factored into your organization's [exposure score](/defender-vulnerability-management/tvm-exposure-score).
Copy file name to clipboardExpand all lines: defender-endpoint/server-migration.md
+50-32Lines changed: 50 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
6
6
author: denisebmsft
7
7
ms.author: deniseb
8
8
ms.localizationpriority: medium
9
-
ms.date: 09/19/2022
9
+
ms.date: 03/18/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -27,14 +27,14 @@ ms.subservice: onboard
27
27
- Microsoft Defender for Servers Plan 1 or Plan 2
28
28
29
29
> [!NOTE]
30
-
> Always ensure the operating system, and Microsoft Defender Antivirus on Windows Server 2016, are fully updated before proceeding with installation or upgrade. To receive regular product improvements and fixes for the EDR Sensor component, ensure Windows Update [KB5005292](https://go.microsoft.com/fwlink/?linkid=2168277) gets applied or approved after installation. In addition, to keep protection components updated, please reference [Manage Microsoft Defender Antivirus updates and apply baselines](/defender-endpoint/microsoft-defender-antivirus-updates/#platform-and-engine-releases).
30
+
> On Windows Server 2016, always ensure the operating system and Microsoft Defender Antivirus are fully updated before proceeding with installation or upgrade. To receive regular product improvements and fixes for the EDR Sensor component, ensure Windows Update [KB5005292](https://go.microsoft.com/fwlink/?linkid=2168277) gets applied or approved after installation. In addition, to keep protection components updated, please reference [Manage Microsoft Defender Antivirus updates and apply baselines](/defender-endpoint/microsoft-defender-antivirus-updates/#platform-and-engine-releases).
31
31
32
-
These instructions apply to the new unified solution and installer (MSI) package of Microsoft Defender for Endpoint for Windows Server 2012 R2 and Windows Server 2016. This article contains high-level instructions for various possible migration scenarios from the previous to the current solution. These high-level steps are intended as guidelines to be adjusted to the deployment and configuration tools available in your environment.
32
+
These instructions apply to the new unified solution and installer (MSI) package of Defender for Endpoint for Windows Server 2012 R2 and Windows Server 2016. This article contains high-level instructions for various possible migration scenarios from the previous to the current solution. These high-level steps are intended as guidelines to be adjusted to the deployment and configuration tools available in your environment.
33
33
34
34
**If you are using Microsoft Defender for Cloud to perform deployment, you can automate installation and upgrade. See [Defender for Servers Plan 2 now integrates with MDE unified solution](https://techcommunity.microsoft.com/t5/microsoft-defender-for-cloud/defender-for-servers-plan-2-now-integrates-with-mde-unified/ba-p/3527534)**
35
35
36
36
> [!NOTE]
37
-
> Operating system upgrades with Microsoft Defender for Endpoint installed aren't supported. Offboard and uninstall, upgrade the operating system, then proceed with installation.
37
+
> Operating system upgrades with Defender for Endpoint installed aren't supported. Offboard, uninstall, upgrade the operating system, and then proceed with installation.
38
38
39
39
## Installer script
40
40
@@ -43,60 +43,77 @@ These instructions apply to the new unified solution and installer (MSI) package
43
43
44
44
To facilitate upgrades when Microsoft Endpoint Configuration Manager isn't yet available or updated to perform the automated upgrade, you can use this [upgrade script](https://github.com/microsoft/mdefordownlevelserver/archive/refs/heads/main.zip). Download it by selection the "Code" button and downloading the .zip file, then extracting install.ps1. It can help automate the following required steps:
45
45
46
-
1. Remove the OMS workspace for Microsoft Defender for Endpoint (OPTIONAL).
46
+
1. Remove the OMS workspace for Defender for Endpoint (OPTIONAL).
47
+
47
48
2. Remove System Center Endpoint Protection (SCEP) client if installed.
49
+
48
50
3. Download and install [prerequisites](configure-server-endpoints.md#prerequisites) if necessary.
49
-
4. Enable and update the Defender Antivirus feature on Windows Server 2016
50
-
5. Install Microsoft Defender for Endpoint.
51
-
6. Apply the onboarding script **for use with Group Policy** downloaded from [Microsoft Defender XDR](https://security.microsoft.com).
52
51
53
-
To use the script, download it to an installation directory where you have also placed the installation and onboarding packages (see [Configure server endpoints](configure-server-endpoints.md)).
52
+
4. Enable and update the Microsoft Defender Antivirus feature on Windows Server 2016.
6. Apply the onboarding script **for use with Group Policy** downloaded from the [Microsoft Defender portal](https://security.microsoft.com).
56
57
57
-
For more information on how to use the script, use the PowerShell command "get-help .\install.ps1".
58
+
To use the script, download it to an installation directory where you have also placed the installation and onboarding packages (see [Configure server endpoints](configure-server-endpoints.md)).
For more information on how to use the script, use the PowerShell command `get-help .\install.ps1`.
58
63
59
64
## Microsoft Endpoint Configuration Manager migration scenarios
60
65
61
66
> [!NOTE]
62
-
> You'll need Microsoft Endpoint Configuration Manager, version 2107 or later to perform Endpoint Protection policy configuration. From [version 2207 or later](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2207#improved-microsoft-defender-for-endpoint-mde-onboarding-for-windows-server-2012-r2-and-windows-server-2016) deployment and upgrades can be fully automated.
67
+
> You'll need Configuration Manager, version 2107 or later to perform Endpoint Protection policy configuration. From [version 2207 or later](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2207#improved-microsoft-defender-for-endpoint-mde-onboarding-for-windows-server-2012-r2-and-windows-server-2016) deployment and upgrades can be fully automated.
63
68
64
-
For instructions on how to migrate using Microsoft Endpoint Configuration Manager older than version 2207, see [Migrating servers from Microsoft Monitoring Agent to the unified solution.](application-deployment-via-mecm.md)
69
+
For instructions on how to migrate using Configuration Manager older than version 2207, see [Migrating servers from Microsoft Monitoring Agent to the unified solution.](application-deployment-via-mecm.md)
65
70
66
71
## If you are running a non-Microsoft antivirus solution
67
72
68
73
1. Fully update the machine including Microsoft Defender Antivirus (Windows Server 2016) ensuring [prerequisites](configure-server-endpoints.md#prerequisites) have been met. For more information on the prerequisites that have to be met, see [Prerequisites for Windows Server 2016](configure-server-endpoints.md#prerequisites-for-windows-server-2016-and-windows-server-2012-r2).
69
-
2. Ensure third-party antivirus management no longer pushes antivirus agents to these machines.*
70
-
3. Author your policies for the protection capabilities in Microsoft Defender for Endpoint and target those to the machine in the tool of your choice.
71
-
4. Install the Microsoft Defender for Endpoint for Windows Server 2012 R2 and 2016 package and **enable passive mode**. See [Install Microsoft Defender Antivirus using command line](configure-server-endpoints.md#install-microsoft-defender-for-endpoint-using-the-command-line).
72
-
a. Apply the onboarding script **for use with Group Policy** downloaded from [Microsoft Defender XDR](https://security.microsoft.com).
73
-
5. Apply updates.
74
-
6. Remove your non-Microsoft antivirus software by either using the non-Microsoft antivirus console or by using Microsoft Endpoint Configuration Manager as
75
-
appropriate. Make sure to remove passive mode configuration.*
76
74
77
-
> [!TIP]
78
-
> You can use the [installer-script](server-migration.md#installer script) as part of your application to automate the above steps. To enable passive mode, apply the -Passive flag. For example, .\install.ps1 -RemoveMMA <YOUR_WORKSPACE_ID> -OnboardingScript ".\WindowsDefenderATPOnboardingScript.cmd" -Passive
75
+
2. Ensure your non-Microsoft antivirus management solution no longer pushes antivirus agents to these machines.
79
76
80
-
*These steps only apply if you intend to replace your non-Microsoft antivirus solution. See [Better together: Microsoft Defender Antivirus and Microsoft Defender for Endpoint](why-use-microsoft-defender-antivirus.md).
77
+
3. Author your policies for the protection capabilities in Defender for Endpoint and target those to the machine in the tool of your choice.
78
+
79
+
4. Install the Defender for Endpoint package for Windows Server 2012 R2 and Windows Server 2016, and set it to passive mode.
80
+
81
+
See [Install Microsoft Defender Antivirus using command line](configure-server-endpoints.md#install-defender-for-endpoint-using-the-command-line).
82
+
83
+
5. Apply the onboarding script **for use with Group Policy** downloaded from the [Microsoft Defender portal](https://security.microsoft.com).
84
+
85
+
6. Apply updates.
81
86
82
-
To move a machine out of passive mode, set the following key to 0:
87
+
7. Remove your non-Microsoft antivirus software by either using the non-Microsoft antivirus console or by using Configuration Manager as appropriate. Make sure to remove passive mode configuration.
To move a machine out of passive mode, set the following key:
88
90
89
-
## If you are running System Center Endpoint Protection but aren't managing the machine using Microsoft Endpoint Configuration Manager (MECM/ConfigMgr)
> You can use the [installer-script](server-migration.md#installer script) as part of your application to automate the above steps. To enable passive mode, apply the -Passive flag. For example, `.\install.ps1 -RemoveMMA <YOUR_WORKSPACE_ID> -OnboardingScript ".\WindowsDefenderATPOnboardingScript.cmd" -Passive`.
98
+
99
+
In the preceding procedure, steps 2 and 7 apply only if you intend to replace your non-Microsoft antivirus solution. See [Better together: Microsoft Defender Antivirus and Microsoft Defender for Endpoint](why-use-microsoft-defender-antivirus.md).
100
+
101
+
## If you are running System Center Endpoint Protection but aren't managing the machine using Configuration Manager (MECM/ConfigMgr)
90
102
91
103
1. Fully update the machine including Microsoft Defender Antivirus (Windows Server 2016) ensuring [prerequisites](configure-server-endpoints.md#prerequisites) have been met.
92
-
2. Create and apply policies using Group Policy, PowerShell, or a 3rd party management solution.
104
+
105
+
2. Create and apply policies using Group Policy, PowerShell, or a non-Microsoft management solution.
106
+
93
107
3. Uninstall System Center Endpoint Protection (Windows Server 2012 R2).
108
+
94
109
4. Install Microsoft Defender for Endpoint (see [Configure server endpoints](configure-server-endpoints.md).)
95
-
5. Apply the onboarding script **for use with Group Policy** downloaded from [Microsoft Defender XDR](https://security.microsoft.com).
110
+
111
+
5. Apply the onboarding script **for use with Group Policy** downloaded from the [Microsoft Defender portal](https://security.microsoft.com).
112
+
96
113
6. Apply updates.
97
114
98
115
> [!TIP]
99
-
> You can use the installer script to automate the above steps.
116
+
> You can use the installer script to automate the steps in the preceding procedure.
100
117
101
118
## Microsoft Defender for Cloud scenarios
102
119
@@ -107,4 +124,5 @@ If you're using Microsoft Defender for Cloud, you can use the automated upgrade
107
124
## Group Policy configuration
108
125
109
126
For configuration using Group Policy, ensure you're using the latest ADMX files in your central store to access the correct Defender for Endpoint policy options. For reference, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](/troubleshoot/windows-client/group-policy/create-and-manage-central-store) and download the latest files **for use with Windows 10**.
127
+
110
128
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-endpoint/switch-to-mde-phase-2.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.subservice: onboard
6
6
ms.author: deniseb
7
7
author: denisebmsft
8
8
ms.localizationpriority: medium
9
-
ms.date: 09/13/2024
9
+
ms.date: 03/17/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -61,7 +61,7 @@ As you're making the switch to Defender for Endpoint, you might need to take cer
61
61
### Set Microsoft Defender Antivirus to passive mode on Windows Server
62
62
63
63
> [!TIP]
64
-
> You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and 2016. For more information, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages).
64
+
> You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and 2016. For more information, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-defender-for-endpoint-packages).
65
65
66
66
1. Open Registry Editor, and then navigate to `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
67
67
@@ -78,7 +78,7 @@ If Microsoft Defender Antivirus features and installation files were previously
78
78
79
79
### Are you using Windows Server 2012 R2 or Windows Server 2016?
80
80
81
-
You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and 2016 using the method described in the previous section. For more information, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-microsoft-defender-for-endpoint-packages).
81
+
You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and 2016 using the method described in the previous section. For more information, see [Options to install Microsoft Defender for Endpoint](configure-server-endpoints.md#options-to-install-the-defender-for-endpoint-packages).
82
82
83
83
## Step 2: Configure Defender for Endpoint Plan 1 or Plan 2
0 commit comments