mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 19:03:46 +00:00
deployment
This commit is contained in:
@ -441,4 +441,171 @@ Microsoft Defender Antivirus is a built-in antimalware solution that provides ne
|
|||||||
|
|
||||||
2. Select **Scheduled scans**, **Scan settings**, **Default actions**, **Real-time protection**, **Exclusion settings**, **Advanced**, **Threat overrides**, **Cloud Protection Service** and **Security intelligence updates** and choose **OK**.
|
2. Select **Scheduled scans**, **Scan settings**, **Default actions**, **Real-time protection**, **Exclusion settings**, **Advanced**, **Threat overrides**, **Cloud Protection Service** and **Security intelligence updates** and choose **OK**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
In certain industries or some select enterprise customers might have specific
|
||||||
|
needs on how Antivirus is configured.
|
||||||
|
|
||||||
|
|
||||||
|
[Quick scan versus full scan and custom scan](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus#quick-scan-versus-full-scan-and-custom-scan)
|
||||||
|
|
||||||
|
For more details, see [Windows Security configuration framework](https://docs.microsoft.com/windows/security/threat-protection/windows-security-configuration-framework/windows-security-configuration-framework)
|
||||||
|
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Right-click on the newly created antimalware policy and select **Deploy** .
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Target the new antimalware policy to your Windows 10 collection and click **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
After completing this task, you now have successfully configured Windows
|
||||||
|
Defender Antivirus.
|
||||||
|
|
||||||
|
## Attack Surface Reduction
|
||||||
|
The attack surface reduction pillar of Microsoft Defender ATP includes the feature set that is available under Exploit Guard. Attack surface reduction (ASR) rules, Controlled Folder Access, Network Protection and Exploit
|
||||||
|
Protection. All these features provide an audit mode and a block mode. In audit mode there is no end user impact all it does is collect additional telemetry and make it available in the Microsoft Defender Security Center. The goal with a deployment is to step by step move security controls into block mode.
|
||||||
|
|
||||||
|
To set ASR rules in Audit mode:
|
||||||
|
|
||||||
|
1. In the System Center Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Endpoint Protection \> Windows Defender Exploit Guard** and choose **Create Exploit Guard Policy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
2. Select **Attack Surface Reduction**.
|
||||||
|
|
||||||
|
|
||||||
|
3. Set rules to **Audit** and click **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Confirm the new Exploit Guard policy by clicking on **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
5. Once the policy is created click **Close**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
6. Right-click on the newly created policy and choose **Deploy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. Target the policy to the newly created Windows 10 collection and click **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
After completing this task, you now have successfully configured ASR rules in audit mode.
|
||||||
|
|
||||||
|
Below are additional steps to verify whether ASR rules are correctly applied to
|
||||||
|
endpoints. (This may take few minutes)
|
||||||
|
|
||||||
|
|
||||||
|
1. From a web browser, navigate to <https://securitycenter.windows.com>.
|
||||||
|
|
||||||
|
2. Select **Configuration management** from left side menu.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Click **Go to attack surface management** in the Attack surface management panel.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Click **Configuration** tab in Attack Surface reduction rules reports. It shows ASR rules configuration overview and ASR rules status on each devices.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. Click each device shows configuration details of ASR rules.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
See [Optimize ASR rule deployment and
|
||||||
|
detections](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-machines-asr) for more details.
|
||||||
|
|
||||||
|
|
||||||
|
### To set Network Protection rules in Audit mode:
|
||||||
|
1. In the System Center Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Endpoint Protection \> Windows Defender Exploit Guard** and choose **Create Exploit Guard Policy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. Select **Network protection**.
|
||||||
|
|
||||||
|
3. Set the setting to **Audit** and click **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Confirm the new Exploit Guard Policy by clicking **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. Once the policy is created click on **Close**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. Right-click on the newly created policy and choose **Deploy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. Select the policy to the newly created Windows 10 collection and choose **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
After completing this task, you now have successfully configured Network
|
||||||
|
Protection in audit mode.
|
||||||
|
|
||||||
|
### To set Controlled Folder Access rules in Audit mode:
|
||||||
|
|
||||||
|
1. In the System Center Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Endpoint Protection \> Windows Defender Exploit Guard** and choose **Create Exploit Guard Policy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. Select **Controlled folder access**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Set the configuration to **Audit** and click **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Confirm the new exploit guard policy by clicking on **Next**
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Once the policy is created click on **Close**
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
> A screenshot of a cell phone Description automatically generated
|
||||||
|
|
||||||
|
> Right click on the newly created policy and choose **Deploy**
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
> A screenshot of a social images post Description automatically generated
|
||||||
|
|
||||||
|
> Target the policy to the newly created Windows 10 collection and choose
|
||||||
|
> **OK**
|
||||||
|
|
||||||
|
After completing this task, you now have successfully configured Controlled
|
||||||
|
folder access in audit mode.
|
||||||
|
Reference in New Issue
Block a user