mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 14:57:23 +00:00
Merge pull request #2994 from MicrosoftDocs/jreeds-av1
changed Windows Defender AV to Microsoft Defender AV
This commit is contained in:
commit
2224e7d556
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Monitor Windows Updates and Windows Defender AV with Update Compliance (Windows 10)
|
||||
title: Monitor Windows Updates and Microsoft Defender AV with Update Compliance (Windows 10)
|
||||
ms.reviewer:
|
||||
manager: laurawi
|
||||
description: You can use Update Compliance in Azure Portal to monitor the progress of updates and key antimalware protection features on devices in your network.
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Collect diagnostic data for Update Compliance and Windows Defender Microsoft Defender Antivirus
|
||||
description: Use a tool to collect data to troubleshoot Update Compliance issues when using the Microsoft Defender Antivirus Assessment add in
|
||||
keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, windows defender av
|
||||
keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, Microsoft Defender AV
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
ms.prod: w10
|
||||
@ -17,13 +17,13 @@ ms.reviewer:
|
||||
manager: dansimp
|
||||
---
|
||||
|
||||
# Collect Update Compliance diagnostic data for Windows Defender AV Assessment
|
||||
# Collect Update Compliance diagnostic data for Microsoft Defender AV Assessment
|
||||
|
||||
**Applies to:**
|
||||
|
||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||
|
||||
This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Windows Defender AV Assessment section in the Update Compliance add-in.
|
||||
This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Microsoft Defender AV Assessment section in the Update Compliance add-in.
|
||||
|
||||
Before attempting this process, ensure you have read [Troubleshoot Microsoft Defender Antivirus reporting](troubleshoot-reporting.md), met all require prerequisites, and taken any other suggested troubleshooting steps.
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Collect diagnostic data of Microsoft Defender Antivirus
|
||||
description: Use a tool to collect data to troubleshoot Microsoft Defender Antivirus
|
||||
keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, windows defender av
|
||||
keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, Microsoft Defender AV
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
ms.prod: w10
|
||||
@ -17,13 +17,13 @@ ms.reviewer:
|
||||
manager: dansimp
|
||||
---
|
||||
|
||||
# Collect Windows Defender AV diagnostic data
|
||||
# Collect Microsoft Defender AV diagnostic data
|
||||
|
||||
**Applies to:**
|
||||
|
||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||
|
||||
This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Windows Defender AV.
|
||||
This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Microsoft Defender AV.
|
||||
|
||||
On at least two devices that are experiencing the same issue, obtain the .cab diagnostic file by taking the following steps:
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Manage Windows Defender in your business
|
||||
description: Learn how to use Group Policy, Configuration Manager, PowerShell, WMI, Intune, and the command line to manage Windows Defender AV
|
||||
description: Learn how to use Group Policy, Configuration Manager, PowerShell, WMI, Intune, and the command line to manage Microsoft Defender AV
|
||||
keywords: group policy, gpo, config manager, sccm, scep, powershell, wmi, intune, defender, antivirus, antimalware, security, protection
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Configure scanning options for Windows Defender AV
|
||||
description: You can configure Windows Defender AV to scan email storage files, back-up or reparse points, network files, and archived files (such as .zip files).
|
||||
title: Configure scanning options for Microsoft Defender AV
|
||||
description: You can configure Microsoft Defender AV to scan email storage files, back-up or reparse points, network files, and archived files (such as .zip files).
|
||||
keywords: advanced scans, scanning, email, archive, zip, rar, archive, reparse scanning
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
|
@ -34,7 +34,7 @@ You can [specify how long the file should be prevented from running](configure-c
|
||||
When Microsoft Defender Antivirus encounters a suspicious but undetected file, it queries our cloud protection backend. The cloud backend applies heuristics, machine learning, and automated analysis of the file to determine whether the files are malicious or clean.
|
||||
|
||||
Microsoft Defender Antivirus uses multiple detection and prevention technologies to deliver accurate, real-time, and intelligent protection. [Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/).
|
||||

|
||||

|
||||
|
||||
In Windows 10, version 1803, block at first sight can now block non-portable executable files (such as JS, VBS, or macros) as well as executable files.
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Configure the Windows Defender AV cloud block timeout period
|
||||
title: Configure the Microsoft Defender AV cloud block timeout period
|
||||
description: You can configure how long Microsoft Defender Antivirus will block a file from running while waiting for a cloud determination.
|
||||
keywords: Microsoft Defender Antivirus, antimalware, security, defender, cloud, timeout, block, period, seconds
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Configure how users can interact with Windows Defender AV
|
||||
description: Configure how end-users interact with Windows Defender AV, what notifications they see, and if they can override settings.
|
||||
title: Configure how users can interact with Microsoft Defender AV
|
||||
description: Configure how end-users interact with Microsoft Defender AV, what notifications they see, and if they can override settings.
|
||||
keywords: endpoint, user, interaction, notifications, ui lockdown mode, headless mode, hide interface
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Set up exclusions for Windows Defender AV scans
|
||||
description: You can exclude files (including files modified by specified processes) and folders from being scanned by Windows Defender AV. Validate your exclusions with PowerShell.
|
||||
title: Set up exclusions for Microsoft Defender AV scans
|
||||
description: You can exclude files (including files modified by specified processes) and folders from being scanned by Microsoft Defender AV. Validate your exclusions with PowerShell.
|
||||
keywords:
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
|
@ -140,7 +140,7 @@ All files under a folder (including files in subdirectories), or a specific file
|
||||
>[!IMPORTANT]
|
||||
>If you have created a list, either with `Set-MpPreference` or `Add-MpPreference`, using the `Set-MpPreference` cmdlet again will overwrite the existing list.
|
||||
|
||||
For example, the following code snippet would cause Windows Defender AV scans to exclude any file with the `.test` file extension:
|
||||
For example, the following code snippet would cause Microsoft Defender AV scans to exclude any file with the `.test` file extension:
|
||||
|
||||
```PowerShell
|
||||
Add-MpPreference -ExclusionExtension ".test"
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Configure local overrides for Windows Defender AV settings
|
||||
description: Enable or disable users from locally changing settings in Windows Defender AV.
|
||||
title: Configure local overrides for Microsoft Defender AV settings
|
||||
description: Enable or disable users from locally changing settings in Microsoft Defender AV.
|
||||
keywords: local override, local policy, group policy, gpo, lockdown,merge, lists
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
|
@ -101,7 +101,7 @@ Remove items from the list | `Remove-MpPreference`
|
||||
>[!IMPORTANT]
|
||||
>If you have created a list, either with `Set-MpPreference` or `Add-MpPreference`, using the `Set-MpPreference` cmdlet again will overwrite the existing list.
|
||||
|
||||
For example, the following code snippet would cause Windows Defender AV scans to exclude any file that is opened by the specified process:
|
||||
For example, the following code snippet would cause Microsoft Defender AV scans to exclude any file that is opened by the specified process:
|
||||
|
||||
```PowerShell
|
||||
Add-MpPreference -ExclusionProcess "c:\internal\test.exe"
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Enable and configure Microsoft Defender Antivirus protection features
|
||||
description: Enable behavior-based, heuristic, and real-time protection in Windows Defender AV.
|
||||
description: Enable behavior-based, heuristic, and real-time protection in Microsoft Defender AV.
|
||||
keywords: heuristic, machine-learning, behavior monitor, real-time protection, always-on, Microsoft Defender Antivirus, antimalware, security, defender
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
|
@ -44,7 +44,7 @@ This guide describes how to configure your VMs for optimal protection and perfor
|
||||
You can also download the whitepaper [Microsoft Defender Antivirus on Virtual Desktop Infrastructure](https://demo.wd.microsoft.com/Content/wdav-testing-vdi-ssu.pdf), which looks at the new shared security intelligence update feature, alongside performance testing and guidance on how you can test antivirus performance on your own VDI.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Although the VDI can be hosted on Windows Server 2012 or Windows Server 2016, the virtual machines (VMs) should be running Windows 10, 1607 at a minimum, due to increased protection technologies and features that are unavailable in earlier versions of Windows.<br/>There are performance and feature improvements to the way in which Windows Defender AV operates on virtual machines in Windows 10 Insider Preview, build 18323 (and later). We'll identify in this guide if you need to be using an Insider Preview build; if it isn't specified, then the minimum required version for the best protection and performance is Windows 10 1607.
|
||||
> Although the VDI can be hosted on Windows Server 2012 or Windows Server 2016, the virtual machines (VMs) should be running Windows 10, 1607 at a minimum, due to increased protection technologies and features that are unavailable in earlier versions of Windows.<br/>There are performance and feature improvements to the way in which Microsoft Defender AV operates on virtual machines in Windows 10 Insider Preview, build 18323 (and later). We'll identify in this guide if you need to be using an Insider Preview build; if it isn't specified, then the minimum required version for the best protection and performance is Windows 10 1607.
|
||||
|
||||
### Set up a dedicated VDI file share
|
||||
|
||||
@ -194,7 +194,7 @@ If you would prefer to do everything manually, this what you would need to do to
|
||||
|
||||
Scheduled scans run in addition to [real-time protection and scanning](configure-real-time-protection-microsoft-defender-antivirus.md).
|
||||
|
||||
The start time of the scan itself is still based on the scheduled scan policy – ScheduleDay, ScheduleTime, ScheduleQuickScanTime. Randomization will cause Windows Defender AV to start a scan on each machine within a 4 hour window from the time set for the scheduled scan.
|
||||
The start time of the scan itself is still based on the scheduled scan policy – ScheduleDay, ScheduleTime, ScheduleQuickScanTime. Randomization will cause Microsoft Defender AV to start a scan on each machine within a 4 hour window from the time set for the scheduled scan.
|
||||
|
||||
See [Schedule scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) for other configuration options available for scheduled scans.
|
||||
|
||||
@ -219,7 +219,7 @@ Sometimes, Microsoft Defender Antivirus notifications may be sent to or persist
|
||||
|
||||
3. Click **OK**.
|
||||
|
||||
This prevents notifications from Windows Defender AV appearing in the action center on Windows 10 when scans or remediation is performed.
|
||||
This prevents notifications from Microsoft Defender AV appearing in the action center on Windows 10 when scans or remediation is performed.
|
||||
|
||||
### Disable scans after an update
|
||||
|
||||
@ -253,7 +253,7 @@ This forces a scan if the VM has missed two or more consecutive scheduled scans.
|
||||
|
||||
2. Click **OK**.
|
||||
|
||||
This hides the entire Windows Defender AV user interface from users.
|
||||
This hides the entire Microsoft Defender AV user interface from users.
|
||||
|
||||
### Exclusions
|
||||
|
||||
|
@ -26,7 +26,7 @@ ms.custom: nextgen
|
||||
> The Microsoft Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud; rather, it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional Security intelligence updates.
|
||||
|
||||
Microsoft Defender Antivirus uses multiple detection and prevention technologies to deliver accurate, real-time, and intelligent protection. [Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/).
|
||||

|
||||

|
||||
|
||||
You can enable or disable Microsoft Defender Antivirus cloud-delivered protection with Microsoft Intune, Microsoft Endpoint Configuration Manager, Group Policy, PowerShell cmdlets, or on individual clients in the Windows Security app.
|
||||
|
||||
|
@ -37,7 +37,7 @@ By default, Microsoft Defender Antivirus will enable itself on a Windows 10 devi
|
||||
|
||||
If Microsoft Defender Antivirus is enabled, the usual options will appear to configure it on that device:
|
||||
|
||||

|
||||

|
||||
|
||||
If another antivirus product is installed and working correctly, Microsoft Defender Antivirus will disable itself. The Windows Security app will change the **Virus & threat protection** section to show status about the AV product, and provide a link to the product's configuration options:
|
||||
|
||||
@ -47,7 +47,7 @@ Underneath any third party AV products, a new link will appear as **Microsoft De
|
||||
|
||||

|
||||
|
||||
Sliding the switch to **On** will show the standard Windows Defender AV options underneath the third party AV product. The limited periodic scanning option will appear at the bottom of the page.
|
||||
Sliding the switch to **On** will show the standard Microsoft Defender AV options underneath the third party AV product. The limited periodic scanning option will appear at the bottom of the page.
|
||||
|
||||

|
||||
|
||||
|
@ -129,9 +129,9 @@ For more information, see [Windows Defender WMIv2 APIs](https://docs.microsoft.c
|
||||
|
||||
## Allow ad hoc changes to protection based on cloud-delivered protection
|
||||
|
||||
Windows Defender AV can make changes to its protection based on cloud-delivered protection. Such changes can occur outside of normal or scheduled protection updates.
|
||||
Microsoft Defender AV can make changes to its protection based on cloud-delivered protection. Such changes can occur outside of normal or scheduled protection updates.
|
||||
|
||||
If you have enabled cloud-delivered protection, Windows Defender AV will send files it is suspicious about to the Windows Defender cloud. If the cloud service reports that the file is malicious, and the file is detected in a recent protection update, you can use Group Policy to configure Windows Defender AV to automatically receive that protection update. Other important protection updates can also be applied.
|
||||
If you have enabled cloud-delivered protection, Microsoft Defender AV will send files it is suspicious about to the Windows Defender cloud. If the cloud service reports that the file is malicious, and the file is detected in a recent protection update, you can use Group Policy to configure Microsoft Defender AV to automatically receive that protection update. Other important protection updates can also be applied.
|
||||
|
||||
### Use Group Policy to automatically download recent updates based on cloud-delivered protection
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Apply Windows Defender AV protection updates to out of date endpoints
|
||||
title: Apply Microsoft Defender AV protection updates to out of date endpoints
|
||||
description: Define when and how updates should be applied for endpoints that have not updated in a while.
|
||||
keywords: updates, protection, out-of-date, outdated, old, catch-up
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
@ -56,7 +56,7 @@ If Microsoft Defender Antivirus did not download protection updates for a specif
|
||||
|
||||
4. Expand the tree to **Windows components > Microsoft Defender Antivirus > Signature Updates**.
|
||||
|
||||
5. Double-click the **Define the number of days after which a catch-up security intelligence update is required** setting and set the option to **Enabled**. Enter the number of days after which you want Windows Defender AV to check for and download the latest protection update.
|
||||
5. Double-click the **Define the number of days after which a catch-up security intelligence update is required** setting and set the option to **Enabled**. Enter the number of days after which you want Microsoft Defender AV to check for and download the latest protection update.
|
||||
|
||||
6. Click **OK**.
|
||||
|
||||
@ -96,11 +96,11 @@ You can also specify the number of days after which Microsoft Defender Antivirus
|
||||
|
||||
5. Expand the tree to **Windows components > Microsoft Defender Antivirus > Signature Updates** and configure the following settings:
|
||||
|
||||
1. Double-click **Define the number of days before spyware definitions are considered out of date** and set the option to **Enabled**. Enter the number of days after which you want Windows Defender AV to consider spyware Security intelligence to be out-of-date.
|
||||
1. Double-click **Define the number of days before spyware definitions are considered out of date** and set the option to **Enabled**. Enter the number of days after which you want Microsoft Defender AV to consider spyware Security intelligence to be out-of-date.
|
||||
|
||||
2. Click **OK**.
|
||||
|
||||
3. Double-click **Define the number of days before virus definitions are considered out of date** and set the option to **Enabled**. Enter the number of days after which you want Windows Defender AV to consider virus Security intelligence to be out-of-date.
|
||||
3. Double-click **Define the number of days before virus definitions are considered out of date** and set the option to **Enabled**. Enter the number of days after which you want Microsoft Defender AV to consider virus Security intelligence to be out-of-date.
|
||||
|
||||
4. Click **OK**.
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Manage how and where Windows Defender AV receives updates
|
||||
title: Manage how and where Microsoft Defender AV receives updates
|
||||
description: Manage the fallback order for how Microsoft Defender Antivirus receives protection updates.
|
||||
keywords: updates, security baselines, protection, fallback order, ADL, MMPC, UNC, file path, share, wsus
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Define how mobile devices are updated by Windows Defender AV
|
||||
description: Manage how mobile devices, such as laptops, should be updated with Windows Defender AV protection updates.
|
||||
title: Define how mobile devices are updated by Microsoft Defender AV
|
||||
description: Manage how mobile devices, such as laptops, should be updated with Microsoft Defender AV protection updates.
|
||||
keywords: updates, protection, schedule updates, battery, mobile device, laptop, notebook, opt-in, microsoft update, wsus, override
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Next-generation protection in Windows 10, Windows Server 2016, and Windows Server 2019
|
||||
description: Learn how to manage, configure, and use Windows Defender AV, the built-in antimalware and antivirus product available in Windows 10 and Windows Server 2016
|
||||
description: Learn how to manage, configure, and use Microsoft Defender AV, the built-in antimalware and antivirus product available in Windows 10 and Windows Server 2016
|
||||
keywords: Microsoft Defender Antivirus, windows defender, antimalware, scep, system center endpoint protection, system center configuration manager, virus, malware, threat, detection, protection, security
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Microsoft Defender Antivirus on Windows Server 2016 and 2019
|
||||
description: Enable and configure Windows Defender AV on Windows Server 2016 and 2019
|
||||
description: Enable and configure Microsoft Defender AV on Windows Server 2016 and 2019
|
||||
keywords: windows defender, server, scep, system center endpoint protection, server 2016, current branch, server 2012
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
@ -91,7 +91,7 @@ To use PowerShell to install Microsoft Defender Antivirus, run the following cmd
|
||||
Install-WindowsFeature -Name Windows-Defender
|
||||
```
|
||||
|
||||
Event messages for the antimalware engine included with Microsoft Defender Antivirus can be found in [Windows Defender AV Events](troubleshoot-microsoft-defender-antivirus.md).
|
||||
Event messages for the antimalware engine included with Microsoft Defender Antivirus can be found in [Microsoft Defender AV Events](troubleshoot-microsoft-defender-antivirus.md).
|
||||
|
||||
|
||||
## Verify Microsoft Defender Antivirus is running
|
||||
@ -190,14 +190,14 @@ If you determine you do want to uninstall Microsoft Defender Antivirus, follow t
|
||||
|
||||
If you unselect **Windows Defender** by itself under the **Windows Defender Features** section, you will be prompted to remove the interface option **GUI for Windows Defender**.
|
||||
|
||||
Windows Defender AV will still run normally without the user interface, but the user interface cannot be enabled if you disable the core **Windows Defender** feature.
|
||||
Microsoft Defender AV will still run normally without the user interface, but the user interface cannot be enabled if you disable the core **Windows Defender** feature.
|
||||
|
||||
### Uninstall Microsoft Defender Antivirus using PowerShell
|
||||
|
||||
>[!NOTE]
|
||||
>You can't uninstall the Windows Security app, but you can disable the interface with these instructions.
|
||||
|
||||
The following PowerShell cmdlet will also uninstall Windows Defender AV on Windows Server 2016 or 2019:
|
||||
The following PowerShell cmdlet will also uninstall Microsoft Defender AV on Windows Server 2016 or 2019:
|
||||
|
||||
```PowerShell
|
||||
Uninstall-WindowsFeature -Name Windows-Defender
|
||||
@ -216,6 +216,6 @@ Uninstall-WindowsFeature -Name Windows-Defender-GUI
|
||||
|
||||
- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)
|
||||
|
||||
- [Configure exclusions in Windows Defender AV on Windows Server](configure-server-exclusions-microsoft-defender-antivirus.md)
|
||||
- [Configure exclusions in Microsoft Defender AV on Windows Server](configure-server-exclusions-microsoft-defender-antivirus.md)
|
||||
|
||||
|
||||
|
@ -48,7 +48,7 @@ To run Microsoft Defender Offline from the endpoint, the user must be logged in
|
||||
Microsoft Defender Offline uses the most recent protection updates available on the endpoint; it's updated whenever Windows Defender Antivirus is updated.
|
||||
|
||||
> [!NOTE]
|
||||
> Before running an offline scan, you should attempt to update Windows Defender AV protection. You can either force an update with Group Policy or however you normally deploy updates to endpoints, or you can manually download and install the latest protection updates from the [Microsoft Malware Protection Center](https://www.microsoft.com/security/portal/definitions/adl.aspx).
|
||||
> Before running an offline scan, you should attempt to update Microsoft Defender AV protection. You can either force an update with Group Policy or however you normally deploy updates to endpoints, or you can manually download and install the latest protection updates from the [Microsoft Malware Protection Center](https://www.microsoft.com/security/portal/definitions/adl.aspx).
|
||||
|
||||
See the [Manage Microsoft Defender Antivirus Security intelligence updates](manage-protection-updates-microsoft-defender-antivirus.md) topic for more information.
|
||||
|
||||
@ -75,7 +75,7 @@ Microsoft Defender Offline scans are indicated under **Malware remediation statu
|
||||
## Configure notifications
|
||||
<a name="manage-notifications"></a>
|
||||
|
||||
Microsoft Defender Offline notifications are configured in the same policy setting as other Windows Defender AV notifications.
|
||||
Microsoft Defender Offline notifications are configured in the same policy setting as other Microsoft Defender AV notifications.
|
||||
|
||||
For more information about notifications in Windows Defender, see the [Configure the notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md) topic.
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Microsoft Defender Antivirus in the Windows Security app
|
||||
description: With Windows Defender AV now included in the Windows Security app, you can review, compare, and perform common tasks.
|
||||
description: With Microsoft Defender AV now included in the Windows Security app, you can review, compare, and perform common tasks.
|
||||
keywords: wdav, antivirus, firewall, security, windows
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
@ -27,8 +27,8 @@ In Windows 10, version 1703 and later, the Windows Defender app is part of the W
|
||||
Settings that were previously part of the Windows Defender client and main Windows Settings have been combined and moved to the new app, which is installed by default as part of Windows 10, version 1703.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). These are disabled automatically when a third-party antivirus or firewall product is installed and kept up to date.<br/>If you do disable the Windows Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Security app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device.
|
||||
>It may also prevent Windows Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed.
|
||||
> Disabling the Windows Security Center service will not disable Microsoft Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). These are disabled automatically when a third-party antivirus or firewall product is installed and kept up to date.<br/>If you do disable the Windows Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Security app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device.
|
||||
>It may also prevent Microsoft Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed.
|
||||
>This will significantly lower the protection of your device and could lead to malware infection.
|
||||
|
||||
|
||||
@ -108,7 +108,7 @@ This section describes how to perform some of the most common tasks when reviewi
|
||||
|
||||
>[!NOTE]
|
||||
>If you switch **Real-time protection** off, it will automatically turn back on after a short delay. This is to ensure you are protected from malware and threats.
|
||||
>If you install another antivirus product, Windows Defender AV will automatically disable itself and will indicate this in the Windows Security app. A setting will appear that will allow you to enable [limited periodic scanning](limited-periodic-scanning-microsoft-defender-antivirus.md).
|
||||
>If you install another antivirus product, Microsoft Defender AV will automatically disable itself and will indicate this in the Windows Security app. A setting will appear that will allow you to enable [limited periodic scanning](limited-periodic-scanning-microsoft-defender-antivirus.md).
|
||||
|
||||
|
||||
<a id="exclusions"></a>
|
||||
|
@ -1,12 +1,12 @@
|
||||
|
||||
# [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)
|
||||
|
||||
## [Windows Defender AV in the Microsoft Defender Security Center app](microsoft-defender-security-center-antivirus.md)
|
||||
## [Microsoft Defender AV in the Microsoft Defender Security Center app](microsoft-defender-security-center-antivirus.md)
|
||||
|
||||
## [Windows Defender AV on Windows Server 2016](microsoft-defender-antivirus-on-windows-server-2016.md)
|
||||
## [Microsoft Defender AV on Windows Server 2016](microsoft-defender-antivirus-on-windows-server-2016.md)
|
||||
|
||||
## [Microsoft Defender Antivirus compatibility](microsoft-defender-antivirus-compatibility.md)
|
||||
### [Use limited periodic scanning in Windows Defender AV](limited-periodic-scanning-microsoft-defender-antivirus.md)
|
||||
### [Use limited periodic scanning in Microsoft Defender AV](limited-periodic-scanning-microsoft-defender-antivirus.md)
|
||||
|
||||
|
||||
## [Evaluate Microsoft Defender Antivirus protection](evaluate-microsoft-defender-antivirus.md)
|
||||
@ -35,18 +35,18 @@
|
||||
### [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md)
|
||||
#### [Detect and block Potentially Unwanted Applications](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md)
|
||||
#### [Enable and configure always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md)
|
||||
### [Configure end-user interaction with Windows Defender AV](configure-end-user-interaction-microsoft-defender-antivirus.md)
|
||||
### [Configure end-user interaction with Microsoft Defender AV](configure-end-user-interaction-microsoft-defender-antivirus.md)
|
||||
#### [Configure the notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md)
|
||||
#### [Prevent users from seeing or interacting with the user interface](prevent-end-user-interaction-microsoft-defender-antivirus.md)
|
||||
#### [Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)
|
||||
|
||||
|
||||
## [Customize, initiate, and review the results of scans and remediation](customize-run-review-remediate-scans-microsoft-defender-antivirus.md)
|
||||
### [Configure and validate exclusions in Windows Defender AV scans](configure-exclusions-microsoft-defender-antivirus.md)
|
||||
### [Configure and validate exclusions in Microsoft Defender AV scans](configure-exclusions-microsoft-defender-antivirus.md)
|
||||
#### [Configure and validate exclusions based on file name, extension, and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md)
|
||||
#### [Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md)
|
||||
#### [Configure exclusions in Windows Defender AV on Windows Server 2016](configure-server-exclusions-microsoft-defender-antivirus.md)
|
||||
### [Configure scanning options in Windows Defender AV](configure-advanced-scan-types-microsoft-defender-antivirus.md)
|
||||
#### [Configure exclusions in Microsoft Defender AV on Windows Server 2016](configure-server-exclusions-microsoft-defender-antivirus.md)
|
||||
### [Configure scanning options in Microsoft Defender AV](configure-advanced-scan-types-microsoft-defender-antivirus.md)
|
||||
### [Configure remediation for scans](configure-remediation-microsoft-defender-antivirus.md)
|
||||
### [Configure scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md)
|
||||
### [Configure and run scans](run-scan-microsoft-defender-antivirus.md)
|
||||
@ -59,10 +59,10 @@
|
||||
|
||||
|
||||
## [Reference topics for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)
|
||||
### [Use Group Policy settings to configure and manage Windows Defender AV](use-group-policy-microsoft-defender-antivirus.md)
|
||||
### [Use System Center Configuration Manager and Microsoft Intune to configure and manage Windows Defender AV](use-intune-config-manager-microsoft-defender-antivirus.md)
|
||||
### [Use PowerShell cmdlets to configure and manage Windows Defender AV](use-powershell-cmdlets-microsoft-defender-antivirus.md)
|
||||
### [Use Windows Management Instrumentation (WMI) to configure and manage Windows Defender AV](use-wmi-microsoft-defender-antivirus.md)
|
||||
### [Use the mpcmdrun.exe commandline tool to configure and manage Windows Defender AV](command-line-arguments-microsoft-defender-antivirus.md)
|
||||
### [Use Group Policy settings to configure and manage Microsoft Defender AV](use-group-policy-microsoft-defender-antivirus.md)
|
||||
### [Use System Center Configuration Manager and Microsoft Intune to configure and manage Microsoft Defender AV](use-intune-config-manager-microsoft-defender-antivirus.md)
|
||||
### [Use PowerShell cmdlets to configure and manage Microsoft Defender AV](use-powershell-cmdlets-microsoft-defender-antivirus.md)
|
||||
### [Use Windows Management Instrumentation (WMI) to configure and manage Microsoft Defender AV](use-wmi-microsoft-defender-antivirus.md)
|
||||
### [Use the mpcmdrun.exe commandline tool to configure and manage Microsoft Defender AV](command-line-arguments-microsoft-defender-antivirus.md)
|
||||
|
||||
|
||||
|
@ -44,7 +44,7 @@ In earlier versions of Windows 10, the setting will hide the Windows Defender cl
|
||||
|
||||

|
||||
|
||||
## Use Group Policy to hide the Windows Defender AV interface from users
|
||||
## Use Group Policy to hide the Microsoft Defender AV interface from users
|
||||
|
||||
1. On your Group Policy management machine, open the [Group Policy Management Console](https://docs.microsoft.com/previous-versions/windows/desktop/gpmc/group-policy-management-console-portal), right-click the Group Policy Object you want to configure and click **Edit**.
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user