mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 05:47:23 +00:00
Merged PR 7687: Resolved conflicts
This commit is contained in:
commit
00944918df
@ -54,7 +54,9 @@ You can also [customize the message displayed on users' desktops](https://docs.m
|
|||||||
|
|
||||||
When a Windows Defender Antivirus client encounters a suspicious but undetected file, it queries our cloud protection backend. The cloud backend will apply heuristics, machine learning, and automated analysis of the file to determine the files as malicious or clean.
|
When a Windows Defender Antivirus client encounters a suspicious but undetected file, it queries our cloud protection backend. The cloud backend will apply heuristics, machine learning, and automated analysis of the file to determine the files as malicious or clean.
|
||||||
|
|
||||||
The Block at First Sight feature only uses the cloud protection backend for executable files and non-portable executable files (such as JS, VBS, or macros) that are downloaded from the Internet, or originating from the Internet zone. A hash value of the .exe file is checked via the cloud backend to determine if this is a previously undetected file.
|
In Windows 10, version 1803, the Block at first sight feature can now block non-portable executable files (such as JS, VBS, or macros) as well as executable files.
|
||||||
|
|
||||||
|
The Block at First Sight feature only uses the cloud protection backend for executable files and non-portable executable files that are downloaded from the Internet, or originating from the Internet zone. A hash value of the .exe file is checked via the cloud backend to determine if this is a previously undetected file.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -11,14 +11,14 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 04/17/2018
|
ms.date: 04/30/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Use next-gen technologies in Windows Defender Antivirus through cloud-delivered protection
|
# Use next-gen technologies in Windows Defender Antivirus through cloud-delivered protection
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- Windows 10, version 1703
|
- Windows 10, version 1703 and later
|
||||||
|
|
||||||
**Audience**
|
**Audience**
|
||||||
|
|
||||||
@ -42,7 +42,7 @@ To understand how next-gen technologies shorten protection delivery time through
|
|||||||
<iframe
|
<iframe
|
||||||
src="https://videoplayercdn.osi.office.net/embed/c2f20f59-ca56-4a7b-ba23-44c60bc62c59" width="768" height="432" allowFullScreen="true" frameBorder="0" scrolling="no"></iframe>
|
src="https://videoplayercdn.osi.office.net/embed/c2f20f59-ca56-4a7b-ba23-44c60bc62c59" width="768" height="432" allowFullScreen="true" frameBorder="0" scrolling="no"></iframe>
|
||||||
|
|
||||||
Read the following blogposts for detailed protection stories involving cloud-protection and Microsoft AI:
|
Read the following blog posts for detailed protection stories involving cloud-protection and Microsoft AI:
|
||||||
|
|
||||||
- [Why Windows Defender Antivirus is the most deployed in the enterprise](https://cloudblogs.microsoft.com/microsoftsecure/2018/03/22/why-windows-defender-antivirus-is-the-most-deployed-in-the-enterprise/)
|
- [Why Windows Defender Antivirus is the most deployed in the enterprise](https://cloudblogs.microsoft.com/microsoftsecure/2018/03/22/why-windows-defender-antivirus-is-the-most-deployed-in-the-enterprise/)
|
||||||
- [Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign](https://cloudblogs.microsoft.com/microsoftsecure/2018/03/07/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign/)
|
- [Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign](https://cloudblogs.microsoft.com/microsoftsecure/2018/03/07/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign/)
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 04/17/2018
|
ms.date: 04/30/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Defender Antivirus in Windows 10 and Windows Server 2016
|
# Windows Defender Antivirus in Windows 10 and Windows Server 2016
|
||||||
@ -49,6 +49,12 @@ Some of the highlights of Windows Defender AV include:
|
|||||||
>- Fast learning (including Block at first sight)
|
>- Fast learning (including Block at first sight)
|
||||||
>- Potentially unwanted application blocking
|
>- Potentially unwanted application blocking
|
||||||
|
|
||||||
|
## What's new in Windows 10, version 1803
|
||||||
|
|
||||||
|
- The [Block at First Sight feature](configure-block-at-first-sight-windows-defender-antivirus.md) can now block non-portable executable files (such as JS, VBS, or macros) as well as executable files.
|
||||||
|
- The [Virus & threat protection area in the Windows Defender Security Center](windows-defender-security-center-antivirus.md) now includes a section for Ransomware protection. It includes Controlled folder access settings and ransomware recovery settings.
|
||||||
|
|
||||||
|
|
||||||
## What's new in Windows 10, version 1703
|
## What's new in Windows 10, version 1703
|
||||||
|
|
||||||
New features for Windows Defender AV in Windows 10, version 1703 include:
|
New features for Windows Defender AV in Windows 10, version 1703 include:
|
||||||
@ -60,9 +66,6 @@ We've expanded this documentation library to cover end-to-end deployment, manage
|
|||||||
- [Evaluation guide for Windows Defender AV](evaluate-windows-defender-antivirus.md)
|
- [Evaluation guide for Windows Defender AV](evaluate-windows-defender-antivirus.md)
|
||||||
- [Deployment guide for Windows Defender AV in a virtual desktop infrastructure environment](deployment-vdi-windows-defender-antivirus.md)
|
- [Deployment guide for Windows Defender AV in a virtual desktop infrastructure environment](deployment-vdi-windows-defender-antivirus.md)
|
||||||
|
|
||||||
See the [In this library](#in-this-library) list at the end of this topic for links to each of the updated sections in this library.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<a id="sysreq"></a>
|
<a id="sysreq"></a>
|
||||||
## Minimum system requirements
|
## Minimum system requirements
|
||||||
|
@ -76,7 +76,7 @@ Item | Windows 10, before version 1703 | Windows 10, version 1703 and later | De
|
|||||||
|
|
||||||
## Common tasks
|
## Common tasks
|
||||||
|
|
||||||
This section describes how to perform some of the most common tasks when reviewing or interacting with the threat protection provided by Windows Defender Antivirus in the new Windows Defender Security Center app.
|
This section describes how to perform some of the most common tasks when reviewing or interacting with the threat protection provided by Windows Defender Antivirus in the Windows Defender Security Center app.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If these settings are configured and deployed using Group Policy, the settings described in this section will be greyed-out and unavailable for use on individual endpoints. Changes made through a Group Policy Object must first be deployed to individual endpoints before the setting will be updated in Windows Settings. The [Configure end-user interaction with Windows Defender Antivirus](configure-end-user-interaction-windows-defender-antivirus.md) topic describes how local policy override settings can be configured.
|
> If these settings are configured and deployed using Group Policy, the settings described in this section will be greyed-out and unavailable for use on individual endpoints. Changes made through a Group Policy Object must first be deployed to individual endpoints before the setting will be updated in Windows Settings. The [Configure end-user interaction with Windows Defender Antivirus](configure-end-user-interaction-windows-defender-antivirus.md) topic describes how local policy override settings can be configured.
|
||||||
@ -142,8 +142,17 @@ This section describes how to perform some of the most common tasks when reviewi
|
|||||||
|
|
||||||
4. Click **See full history** under each of the categories (**Current threats**, **Quarantined threats**, **Allowed threats**).
|
4. Click **See full history** under each of the categories (**Current threats**, **Quarantined threats**, **Allowed threats**).
|
||||||
|
|
||||||
|
<a id="ransomware"></a>
|
||||||
|
**Set ransomware protection and recovery options**
|
||||||
|
1. Open the Windows Defender Security Center app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||||
|
|
||||||
|
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar).
|
||||||
|
|
||||||
|
3. Click **Ransomware protection**.
|
||||||
|
|
||||||
|
4. To change Controlled folder access settings, see [Protect important folders with Controlled folder access](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard).
|
||||||
|
|
||||||
|
5. To set up ransomware recovery options, click **Set up** under **Ransomware data recovery** and follow the instructions for linking or setting up your OneDrive account so you can easily recover from a ransomware attack.
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
@ -46,7 +46,7 @@ This topic describes how to customize the following settings of the Controlled f
|
|||||||
- [Add apps that should be allowed to access protected folders](#allow-specifc-apps-to-make-changes-to-controlled-folders)
|
- [Add apps that should be allowed to access protected folders](#allow-specifc-apps-to-make-changes-to-controlled-folders)
|
||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
>Controlled folder access is a new technology that monitors apps for activities that may be malicious. Sometimes it might block a legitimate app from making legitimate changes to your files.
|
>Controlled folder access monitors apps for activities that may be malicious. Sometimes it might block a legitimate app from making legitimate changes to your files.
|
||||||
>
|
>
|
||||||
>This may impact your organization's productivity, so you may want to consider running the feature in [audit mode](audit-windows-defender-exploit-guard.md) to fully assess the feature's impact.
|
>This may impact your organization's productivity, so you may want to consider running the feature in [audit mode](audit-windows-defender-exploit-guard.md) to fully assess the feature's impact.
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ ms.date: 04/30/2018
|
|||||||
- Windows 10, version 1703 and later
|
- Windows 10, version 1703 and later
|
||||||
|
|
||||||
|
|
||||||
The **Virus & threat protection** section contains information and settings for antivirus protection from Windows Defender Antivirus and third-party AV products. In Windows 10, version 1803 and later, this section also contains information and settings for ransomware protection and recovery, including Controlled folder access settings and sign in to Microsoft OneDrive. IT administrators and IT pros can get more information and documentation about configuration from the following:
|
The **Virus & threat protection** section contains information and settings for antivirus protection from Windows Defender Antivirus and third-party AV products. In Windows 10, version 1803, this section also contains information and settings for ransomware protection and recovery. This includes Controlled folder access settings to prevent unknown apps from changing files in protected folders, plus Microsoft OneDrive configuration to help you recover from a ransomware attack. This area also notifies users and provides recovery instructions in the event of a ransomware attack. IT administrators and IT pros can get more information and documentation about configuration from the following:
|
||||||
|
|
||||||
- [Windows Defender Antivirus in the Windows Defender Security Center app](../windows-defender-antivirus/windows-defender-security-center-antivirus.md)
|
- [Windows Defender Antivirus in the Windows Defender Security Center app](../windows-defender-antivirus/windows-defender-security-center-antivirus.md)
|
||||||
- [Windows Defender Antivirus documentation library](../windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)
|
- [Windows Defender Antivirus documentation library](../windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user