Skip to content

Commit fde8670

Browse files
authored
Merge pull request #2998 from YongRhee-MSFT/docs-editor/detect-block-potentially-unwan-1741102824
Update detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md
2 parents a483abb + a54db0c commit fde8670

File tree

1 file changed

+25
-13
lines changed

1 file changed

+25
-13
lines changed

defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md

Lines changed: 25 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: emmwalshh
77
ms.author: ewalsh
88
ms.custom: nextgen
99
audience: ITPro
10-
ms.reviewer: mimilone, julih
10+
ms.reviewer: yongrhee, mimilone, julih
1111
manager: deniseb
1212
ms.subservice: ngp
1313
ms.topic: conceptual
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
- mde-ngp
1818
search.appverid: met150
19-
ms.date: 05/17/2024
19+
ms.date: 03/04/2025
2020
---
2121

2222
# Detect and block potentially unwanted applications
@@ -36,6 +36,7 @@ ms.date: 05/17/2024
3636

3737
Microsoft Defender Antivirus is available in the following editions/versions of Windows and Windows Server:
3838

39+
- Windows Server 2025
3940
- Windows Server 2022
4041
- Windows Server 2019
4142
- Windows Server, version 1803 or later
@@ -81,21 +82,21 @@ Although potentially unwanted application protection in Microsoft Edge (Chromium
8182
3. Under the **Security** section, turn on **Block potentially unwanted apps**.
8283

8384
> [!TIP]
84-
> If you are running Microsoft Edge (Chromium-based), you can safely explore the URL-blocking feature of PUA protection by testing it out on one of our [Microsoft Defender SmartScreen demo pages](https://demo.smartscreen.msft.net/).
85+
> If you're running Microsoft Edge (Chromium-based), you can safely explore the URL-blocking feature of PUA protection by testing it out on one of our [Microsoft Defender SmartScreen demo pages](https://demo.smartscreen.msft.net/).
8586
8687
### Block URLs with Microsoft Defender SmartScreen
8788

8889
In Chromium-based Microsoft Edge with PUA protection turned on, Microsoft Defender SmartScreen protects you from PUA-associated URLs.
8990

90-
Security admins can [configure](/DeployEdge/configure-microsoft-edge) how Microsoft Edge and Microsoft Defender SmartScreen work together to protect groups of users from PUA-associated URLs. There are several [group policy settings](/DeployEdge/microsoft-edge-policies#smartscreen-settings) explicitly for Microsoft Defender SmartScreen available, including [one for blocking PUA](/DeployEdge/microsoft-edge-policies#smartscreenpuaenabled). In addition, admins can [configure Microsoft Defender SmartScreen](/microsoft-edge/deploy/available-policies?source=docs#configure-windows-defender-smartscreen) as a whole, using group policy settings to turn Microsoft Defender SmartScreen on or off.
91+
Security administrators can [configure](/DeployEdge/configure-microsoft-edge) how Microsoft Edge and Microsoft Defender SmartScreen work together to protect groups of users from PUA-associated URLs. There are several [group policy settings](/DeployEdge/microsoft-edge-policies#smartscreen-settings) explicitly for Microsoft Defender SmartScreen available, including [one for blocking PUA](/DeployEdge/microsoft-edge-policies#smartscreenpuaenabled). In addition, admins can [configure Microsoft Defender SmartScreen](/microsoft-edge/deploy/available-policies?source=docs#configure-windows-defender-smartscreen) as a whole, using group policy settings to turn Microsoft Defender SmartScreen on or off.
9192

9293
Although Microsoft Defender for Endpoint has its own blocklist based upon a data set managed by Microsoft, you can customize this list based on your own threat intelligence. If you [create and manage indicators](indicators-overview.md) in the Microsoft Defender for Endpoint portal, Microsoft Defender SmartScreen respects the new settings.
9394

9495
## Microsoft Defender Antivirus and PUA protection
9596

9697
The potentially unwanted application (PUA) protection feature in Microsoft Defender Antivirus can detect and block PUA on endpoints in your network.
9798

98-
Microsoft Defender Antivirus blocks detected PUA files and any attempts to download, move, run, or install them. Blocked PUA files are then moved to quarantine. When a PUA file is detected on an endpoint, Microsoft Defender Antivirus sends a notification to the user ([unless notifications have been disabled](configure-notifications-microsoft-defender-antivirus.md) in the same format as other threat detections. The notification is prefaced with `PUA:` to indicate its content.
99+
Microsoft Defender Antivirus blocks detected PUA files and any attempts to download, move, run, or install them. Blocked PUA files are then moved to quarantine. When a PUA file is detected on an endpoint, Microsoft Defender Antivirus sends a notification to the user ([unless notifications are disabled](configure-notifications-microsoft-defender-antivirus.md) in the same format as other threat detections. The notification is prefaced with `PUA:` to indicate its content.
99100

100101
The notification appears in the usual [quarantine list within the Windows Security app](microsoft-defender-security-center-antivirus.md).
101102

@@ -122,7 +123,7 @@ See the following articles:
122123

123124
PUA protection is enabled by default in the Microsoft Configuration Manager (Current Branch).
124125

125-
See [How to create and deploy antimalware policies: Scheduled scans settings](/configmgr/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings) for details on configuring Microsoft Configuration Manager (Current Branch).
126+
See [How to create and deploy anti-malware policies: Scheduled scans settings](/configmgr/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings) for details on configuring Microsoft Configuration Manager (Current Branch).
126127

127128
For System Center 2012 Configuration Manager, see [How to Deploy Potentially Unwanted Application Protection Policy for Endpoint Protection in Configuration Manager](/previous-versions/system-center/system-center-2012-R2/hh508770(v=technet.10)#BKMK_PUA).
128129

@@ -155,7 +156,7 @@ For System Center 2012 Configuration Manager, see [How to Deploy Potentially Unw
155156
Set-MpPreference -PUAProtection Enabled
156157
```
157158

158-
Setting the value for this cmdlet to `Enabled` turns on the feature if it has been disabled.
159+
Setting the value for this cmdlet to `Enabled` turns on the feature if it is disabled.
159160

160161
#### To set PUA protection to audit mode
161162

@@ -175,6 +176,19 @@ Set-MpPreference -PUAProtection Disabled
175176

176177
Setting the value for this cmdlet to `Disabled` turns off the feature if it has been enabled.
177178

179+
#### To query the PUA status
180+
181+
182+
```powershell
183+
get-mpPreference | ft PUAProtection
184+
```
185+
186+
|Value | Description|
187+
| -------- | -------- |
188+
| `0` | PUA Protection off (Default). Microsoft Defender Antivirus won't protect against potentially unwanted applications. |
189+
| `1` | PUA Protection on. Detected items are blocked. They will show in history along with other threats.|
190+
| `2` | Audit mode. Microsoft Defender Antivirus will detect potentially unwanted applications but take no action. You can review information about the applications Windows Defender would've taken action against by searching for events created by Windows Defender in the Event Viewer.|
191+
178192
For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/index).
179193

180194
## Test and make sure that PUA blocking works
@@ -224,16 +238,14 @@ Sometimes a file is erroneously blocked by PUA protection, or a feature of a PUA
224238

225239
For more information, see [Configure and validate exclusions based on file extension and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md).
226240

227-
> [!TIP]
228-
> If you're looking for Antivirus related information for other platforms, see:
229-
> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
230-
> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
231-
> - [Configure Defender for Endpoint on Android features](android-configure.md)
232-
> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
233241

234242
## See also
235243

236244
- [Next-generation protection](microsoft-defender-antivirus-windows.md)
237245
- [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md)
246+
- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
247+
- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
248+
- [Configure Defender for Endpoint on Android features](android-configure.md)
249+
- [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
238250

239251
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)