mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 06:17:22 +00:00
Merge pull request #2509 from MicrosoftDocs/edr-blocking
EDR in block mode
This commit is contained in:
commit
237e38a045
@ -15875,6 +15875,11 @@
|
|||||||
"source_path": "windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device.md",
|
"source_path": "windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device.md",
|
||||||
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device",
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/windows-defender-antivirus/shadow-protection.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/edr-in-block-mode",
|
||||||
|
"redirect_document_id": true
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -14,16 +14,12 @@
|
|||||||
|
|
||||||
## [Plan deployment](microsoft-defender-atp/deployment-strategy.md)
|
## [Plan deployment](microsoft-defender-atp/deployment-strategy.md)
|
||||||
|
|
||||||
|
|
||||||
## [Deployment guide]()
|
## [Deployment guide]()
|
||||||
### [Deployment phases](microsoft-defender-atp/deployment-phases.md)
|
### [Deployment phases](microsoft-defender-atp/deployment-phases.md)
|
||||||
### [Phase 1: Prepare](microsoft-defender-atp/prepare-deployment.md)
|
### [Phase 1: Prepare](microsoft-defender-atp/prepare-deployment.md)
|
||||||
### [Phase 2: Set up](microsoft-defender-atp/production-deployment.md)
|
### [Phase 2: Set up](microsoft-defender-atp/production-deployment.md)
|
||||||
### [Phase 3: Onboard](microsoft-defender-atp/onboarding.md)
|
### [Phase 3: Onboard](microsoft-defender-atp/onboarding.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [Security administration]()
|
## [Security administration]()
|
||||||
### [Threat & Vulnerability Management]()
|
### [Threat & Vulnerability Management]()
|
||||||
#### [Overview of Threat & Vulnerability Management](microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md)
|
#### [Overview of Threat & Vulnerability Management](microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md)
|
||||||
@ -43,7 +39,6 @@
|
|||||||
#### [Attack surface reduction configuration settings](microsoft-defender-atp/configure-attack-surface-reduction.md)
|
#### [Attack surface reduction configuration settings](microsoft-defender-atp/configure-attack-surface-reduction.md)
|
||||||
#### [Attack surface reduction FAQ](microsoft-defender-atp/attack-surface-reduction-faq.md)
|
#### [Attack surface reduction FAQ](microsoft-defender-atp/attack-surface-reduction-faq.md)
|
||||||
|
|
||||||
|
|
||||||
#### [Attack surface reduction controls]()
|
#### [Attack surface reduction controls]()
|
||||||
##### [Attack surface reduction rules](microsoft-defender-atp/attack-surface-reduction.md)
|
##### [Attack surface reduction rules](microsoft-defender-atp/attack-surface-reduction.md)
|
||||||
##### [Enable attack surface reduction rules](microsoft-defender-atp/enable-attack-surface-reduction.md)
|
##### [Enable attack surface reduction rules](microsoft-defender-atp/enable-attack-surface-reduction.md)
|
||||||
@ -257,8 +252,6 @@
|
|||||||
|
|
||||||
## [Security operations]()
|
## [Security operations]()
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### [Endpoint detection and response]()
|
### [Endpoint detection and response]()
|
||||||
#### [Endpoint detection and response overview](microsoft-defender-atp/overview-endpoint-detection-response.md)
|
#### [Endpoint detection and response overview](microsoft-defender-atp/overview-endpoint-detection-response.md)
|
||||||
#### [Security operations dashboard](microsoft-defender-atp/security-operations-dashboard.md)
|
#### [Security operations dashboard](microsoft-defender-atp/security-operations-dashboard.md)
|
||||||
@ -267,6 +260,7 @@
|
|||||||
##### [Manage incidents](microsoft-defender-atp/manage-incidents.md)
|
##### [Manage incidents](microsoft-defender-atp/manage-incidents.md)
|
||||||
##### [Investigate incidents](microsoft-defender-atp/investigate-incidents.md)
|
##### [Investigate incidents](microsoft-defender-atp/investigate-incidents.md)
|
||||||
|
|
||||||
|
|
||||||
#### [Alerts queue]()
|
#### [Alerts queue]()
|
||||||
##### [View and organize the Alerts queue](microsoft-defender-atp/alerts-queue.md)
|
##### [View and organize the Alerts queue](microsoft-defender-atp/alerts-queue.md)
|
||||||
##### [Manage alerts](microsoft-defender-atp/manage-alerts.md)
|
##### [Manage alerts](microsoft-defender-atp/manage-alerts.md)
|
||||||
@ -317,10 +311,6 @@
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
##### [Shadow protection?](windows-defender-antivirus/shadow-protection.md)
|
|
||||||
|
|
||||||
#### [Use sensitivity labels to prioritize incident response](microsoft-defender-atp/information-protection-investigation.md)
|
#### [Use sensitivity labels to prioritize incident response](microsoft-defender-atp/information-protection-investigation.md)
|
||||||
|
|
||||||
#### [Reporting]()
|
#### [Reporting]()
|
||||||
@ -334,10 +324,9 @@
|
|||||||
##### [Understand custom detections](microsoft-defender-atp/overview-custom-detections.md)
|
##### [Understand custom detections](microsoft-defender-atp/overview-custom-detections.md)
|
||||||
##### [Create and manage detection rules](microsoft-defender-atp/custom-detection-rules.md)
|
##### [Create and manage detection rules](microsoft-defender-atp/custom-detection-rules.md)
|
||||||
|
|
||||||
|
### [Behavioral blocking and containment]()
|
||||||
|
#### [Behavioral blocking and containment](microsoft-defender-atp/behavioral-blocking-containment.md)
|
||||||
|
#### [EDR in block mode](microsoft-defender-atp/edr-in-block-mode.md)
|
||||||
|
|
||||||
|
|
||||||
### [Automated investigation and response]()
|
### [Automated investigation and response]()
|
||||||
#### [Overview of AIR](microsoft-defender-atp/automated-investigations.md)
|
#### [Overview of AIR](microsoft-defender-atp/automated-investigations.md)
|
||||||
@ -702,7 +691,7 @@
|
|||||||
|
|
||||||
### [Microsoft Defender SmartScreen](microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md)
|
### [Microsoft Defender SmartScreen](microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md)
|
||||||
#### [Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings](microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md)
|
#### [Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings](microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md)
|
||||||
#### [Set up and use Microsft Defender SmartScreen on individual devices](microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md)
|
#### [Set up and use Microsoft Defender SmartScreen on individual devices](microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md)
|
||||||
|
|
||||||
|
|
||||||
### [Windows Sandbox](windows-sandbox/windows-sandbox-overview.md)
|
### [Windows Sandbox](windows-sandbox/windows-sandbox-overview.md)
|
||||||
|
@ -0,0 +1,49 @@
|
|||||||
|
---
|
||||||
|
title: Behavioral blocking and containment
|
||||||
|
description: Learn about behavioral blocking and containment capabilities in Microsoft Defender ATP
|
||||||
|
keywords: Microsoft Defender ATP, EDR in block mode, passive mode blocking
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.pagetype: security
|
||||||
|
author: denisebmsft
|
||||||
|
ms.author: deniseb
|
||||||
|
manager: dansimp
|
||||||
|
ms.reviewer: shwetaj
|
||||||
|
audience: ITPro
|
||||||
|
ms.topic: article
|
||||||
|
ms.prod: w10
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.custom:
|
||||||
|
- next-gen
|
||||||
|
- edr
|
||||||
|
ms.collection:
|
||||||
|
---
|
||||||
|
|
||||||
|
# Behavioral blocking and containment
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
|
## Behavioral blocking and containment overview
|
||||||
|
|
||||||
|
Not all cyberattacks involve a simple piece of malware that's found and removed. Some attacks, such as fileless attacks, are much more difficult to identify, let alone contain. Microsoft Defender ATP includes behavioral blocking and containment capabilities that can help identify and stop threats with machine learning, pre- and post-breach. In almost real time, when a suspicious behavior or artifact is detected and determined to be malicious, the threat is blocked. Pre-execution models learn about that threat, and prevent it from running on other endpoints.
|
||||||
|
|
||||||
|
## Behavioral blocking and containment capabilities
|
||||||
|
|
||||||
|
Behavioral blocking and containment capabilities include the following:
|
||||||
|
|
||||||
|
- **On-client, policy-driven [attack surface reduction rules](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction)**. Predefined common attack behaviors are prevented from executing, according to your attack surface reduction rules. When such behaviors attempt to execute, they can be seen in the Microsoft Defender Security Center (https://securitycenter.windows.com) as informational alerts. (Attack surface reduction rules are not enabled by default; you configure your policies in the Microsoft Defender Security Center.)
|
||||||
|
|
||||||
|
- **Client behavioral blocking**. Threats on endpoints are detected through machine learning, and then are blocked and remediated automatically. (Client behavioral blocking is enabled by default.)
|
||||||
|
|
||||||
|
- **Feedback-loop blocking** (also referred to as rapid protection). Threat detections that are assumed to be false negatives are observed through behavioral intelligence. Threats are stopped and prevented from running on other endpoints. (Feedback-loop blocking is enabled by default.)
|
||||||
|
|
||||||
|
- **[Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md)**. Malicious artifacts or behaviors that are observed through post-breach protection are blocked and contained. EDR in block mode works even if Windows Defender Antivirus is not the primary antivirus solution. (EDR in block mode, currently in [limited private preview](edr-in-block-mode.md#can-i-participate-in-the-preview-of-edr-in-block-mode), is not enabled by default; you turn it on in the Microsoft Defender Security Center.)
|
||||||
|
|
||||||
|
As Microsoft continues to improve threat protection features and capabilities, you can expect more to come in the area of behavioral blocking and containment. Visit the [Microsoft 365 roadmap](https://www.microsoft.com/microsoft-365/roadmap) to see what's rolling out now and what's in development.
|
||||||
|
|
||||||
|
## Next steps
|
||||||
|
|
||||||
|
- [Configure your attack surface reduction rules](attack-surface-reduction.md)
|
||||||
|
|
||||||
|
- [Enable EDR in block mode](edr-in-block-mode.md)
|
@ -0,0 +1,95 @@
|
|||||||
|
---
|
||||||
|
title: Endpoint detection and response in block mode
|
||||||
|
description: Learn about endpoint detection and response in block mode
|
||||||
|
keywords: Microsoft Defender ATP, EDR in block mode, passive mode blocking
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.pagetype: security
|
||||||
|
author: denisebmsft
|
||||||
|
ms.author: deniseb
|
||||||
|
manager: dansimp
|
||||||
|
ms.reviewer: shwetaj
|
||||||
|
audience: ITPro
|
||||||
|
ms.topic: article
|
||||||
|
ms.prod: w10
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.custom:
|
||||||
|
- next-gen
|
||||||
|
- edr
|
||||||
|
ms.collection:
|
||||||
|
---
|
||||||
|
|
||||||
|
# Endpoint detection and response (EDR) in block mode
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
|
## What is EDR in block mode?
|
||||||
|
|
||||||
|
When [endpoint detection and response](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response) (EDR) in block mode is enabled, Microsoft Defender ATP leverages behavioral blocking and containment capabilities by blocking malicious artifacts or behaviors that are observed through post-breach protection. EDR in block mode works behind the scenes to remediate malicious artifacts that are detected post-breach.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> EDR in block mode is currently in **[limited private preview](#can-i-participate-in-the-preview-of-edr-in-block-mode)**. To get the best protection, make sure to **[deploy Microsoft Defender ATP baselines](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline)**.
|
||||||
|
|
||||||
|
## What happens when something is detected?
|
||||||
|
|
||||||
|
When EDR in block mode is turned on, and a malicious artifact is detected, blocking and remediation actions are taken. You'll see detection status as **Blocked** or **Remediated** as completed actions in the [Action center](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts#check-activity-details-in-action-center).
|
||||||
|
|
||||||
|
The following image shows an instance of unwanted software that was detected and blocked through EDR in block mode:
|
||||||
|
|
||||||
|
:::image type="content" source="images/edr-in-block-mode.jpg" alt-text="EDR in block mode detected something":::
|
||||||
|
|
||||||
|
|
||||||
|
## Enable EDR in block mode
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Make sure the [requirements](#requirements-for-edr-in-block-mode) are met before turning on EDR in block mode.
|
||||||
|
|
||||||
|
1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in.
|
||||||
|
|
||||||
|
2. Choose **Settings** > **Advanced features**.
|
||||||
|
|
||||||
|
3. Turn on **EDR in block mode**.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> EDR in block mode can be turned on only in the Microsoft Defender Security Center. You cannot use registry keys, Intune, or group policies to enable or disable EDR in block mode.
|
||||||
|
|
||||||
|
## Requirements for EDR in block mode
|
||||||
|
|
||||||
|
|Requirement |Details |
|
||||||
|
|---------|---------|
|
||||||
|
|Permissions |Global Administrator or Security Administrator role assigned in [Azure Active Directory](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-users-assign-role-azure-portal). See [Basic permissions](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/basic-permissions). |
|
||||||
|
|Operating system |One of the following versions: <br/>- Windows 10 (all releases) <br/>- Windows Server 2016 or later |
|
||||||
|
|Windows E5 enrollment |Windows E5 is included in the following subscriptions: <br/>- Microsoft 365 E5 <br/>- Microsoft 365 E3 together with the Identity & Threat Protection offering <br/><br/>See [Components](https://docs.microsoft.com/microsoft-365/enterprise/microsoft-365-overview?view=o365-worldwide#components) and [features and capabilities for each plan](https://www.microsoft.com/microsoft-365/compare-all-microsoft-365-plans). |
|
||||||
|
|Cloud-delivered protection |Make sure Windows Defender Antivirus is configured such that cloud-delivered protection is enabled. <br/><br/>See [Enable cloud-delivered protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus). |
|
||||||
|
|Windows Defender Antivirus antimalware client |Make sure your client is up to date. Using PowerShell, run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps) cmdlet as an administrator. <br/>In the **AMProductVersion** line, you should see **4.18.2001.10** or above. |
|
||||||
|
|Windows Defender Antivirus engine |Make sure your engine is up to date. Using PowerShell, run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps) cmdlet as an administrator. <br/> In the **AMEngineVersion** line, you should see **1.1.16700.2** or above. |
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> To get the best protection value, make sure your antivirus solution is configured to receive regular updates and essential features.
|
||||||
|
|
||||||
|
|
||||||
|
## Frequently asked questions
|
||||||
|
|
||||||
|
### Will EDR in block mode have any impact on a user's antivirus protection?
|
||||||
|
|
||||||
|
No. EDR in block mode does not affect third-party antivirus protection running on users' machines. EDR in block mode kicks in if the primary antivirus solution misses something, or if there is a post-breach detection. EDR in block mode works just like [Windows Defender Antivirus in passive mode](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility#functionality-and-features-available-in-each-state), with the additional steps of blocking and remediating malicious artifacts or behaviors that are detected.
|
||||||
|
|
||||||
|
### Why do I need to keep Windows Defender Antivirus up to date?
|
||||||
|
|
||||||
|
Because Windows Defender Antivirus detects and remediates malicious items, it's important to keep it up to date to leverage the latest machine learning models, behavioral detections, and heuristics for EDR in block mode to be most effective. The [Microsoft Defender ATP](https://docs.microsoft.com/windows/security/threat-protection) stack of capabilities works in an integrated manner, and to get best protection value, you should keep Windows Defender Antivirus up to date.
|
||||||
|
|
||||||
|
### Why do we need cloud protection on?
|
||||||
|
|
||||||
|
Cloud protection is needed to turn on the feature on the device. Cloud protection allows [Microsoft Defender ATP](https://docs.microsoft.com/windows/security/threat-protection) to deliver the latest and greatest protection based on our breadth and depth of security intelligence, along with behavioral and machine learning models.
|
||||||
|
|
||||||
|
### Can I participate in the preview of EDR in block mode?
|
||||||
|
|
||||||
|
EDR in block mode is currently in limited private preview. If you would like to participate in this private preview program, send email to `shwjha@microsoft.com`.
|
||||||
|
|
||||||
|
## Related articles
|
||||||
|
|
||||||
|
[Behavioral blocking and containment](behavioral-blocking-containment.md)
|
||||||
|
|
||||||
|
[Better together: Windows Defender Antivirus and Microsoft Defender Advanced Threat Protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/why-use-microsoft-antivirus)
|
||||||
|
|
Before Width: | Height: | Size: 44 KiB After Width: | Height: | Size: 44 KiB |
Before Width: | Height: | Size: 19 KiB After Width: | Height: | Size: 19 KiB |
@ -1,94 +0,0 @@
|
|||||||
---
|
|
||||||
title: Shadow protection
|
|
||||||
description: Learn about shadow protection
|
|
||||||
keywords: Windows Defender Antivirus, shadow protection, passive mode
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
ms.pagetype: security
|
|
||||||
author: denisebmsft
|
|
||||||
ms.author: deniseb
|
|
||||||
manager: dansimp
|
|
||||||
ms.reviewer: shwetaj
|
|
||||||
audience: ITPro
|
|
||||||
ms.topic: article
|
|
||||||
ms.prod: w10
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
ms.custom: next-gen
|
|
||||||
ms.collection:
|
|
||||||
---
|
|
||||||
|
|
||||||
# Shadow protection
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
|
|
||||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
|
||||||
|
|
||||||
## What is shadow protection?
|
|
||||||
|
|
||||||
When enabled, shadow protection extends behavioral-based blocking and containment capabilities by blocking malicious artifacts or behaviors observed through post-breach protection. This is the case even if [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) is not your active antivirus protection. Shadow protection is useful if your organization has not fully transitioned to Windows Defender Antivirus and you are presently using a third-party antivirus solution. Shadow protection works behind the scenes by remediating malicious entities identified in post-breach protection that the existing third-party antivirus solution missed.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Shadow protection is currently in [limited private preview](#can-i-participate-in-the-private-preview-of-shadow-protection).
|
|
||||||
|
|
||||||
To get the best protection, [deploy Microsoft Defender ATP baselines](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline). And see [Better together: Windows Defender Antivirus and Microsoft Defender Advanced Threat Protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/why-use-microsoft-antivirus).
|
|
||||||
|
|
||||||
## What happens when something is detected?
|
|
||||||
|
|
||||||
When shadow protection is turned on, and a malicious artifact is detected, the detection results in blocking and remediation actions. You'll see detection status as **Blocked** or **Remediated** as completed actions in the [Action center](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation#review-completed-actions).
|
|
||||||
|
|
||||||
The following images shows an instance of unwanted software that was detected and blocked through shadow protection:
|
|
||||||
|
|
||||||
:::image type="content" source="images/shadow-protection-detection.jpg" alt-text="Malware detected by shadow protection":::
|
|
||||||
|
|
||||||
## Turn on shadow protection
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> Make sure the [requirements](#requirements-for-shadow-protection) are met before turning shadow protection on.
|
|
||||||
|
|
||||||
1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in.
|
|
||||||
|
|
||||||
2. Choose **Settings** > **Advanced features**.
|
|
||||||
|
|
||||||
:::image type="content" source="images/turn-shadow-protection-on.jpg" alt-text="Turn shadow protection on":::
|
|
||||||
|
|
||||||
3. Turn shadow protection on.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Shadow protection can be turned on only in the Microsoft Defender Security Center. You cannot use registry keys, Intune, or group policies to turn shadow protection on or off.
|
|
||||||
|
|
||||||
## Requirements for shadow protection
|
|
||||||
|
|
||||||
|Requirement |Details |
|
|
||||||
|---------|---------|
|
|
||||||
|Permissions |Global Administrator or Security Administrator role assigned in [Azure Active Directory](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-users-assign-role-azure-portal). See [Basic permissions](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/basic-permissions). |
|
|
||||||
|Operating system |One of the following: <br/>- Windows 10 (all releases) <br/>- Windows Server 2016 or later |
|
|
||||||
|Windows E5 enrollment |This is included in the following subscriptions: <br/>- Microsoft 365 E5 <br/>- Microsoft 365 E3 together with the Identity & Threat Protection offering <br/>See [Components](https://docs.microsoft.com/microsoft-365/enterprise/microsoft-365-overview?view=o365-worldwide#components) and [Features and capabilities for each plan](https://www.microsoft.com/microsoft-365/compare-all-microsoft-365-plans). |
|
|
||||||
|Cloud-delivered protection |Make sure Windows Defender Antivirus is configured such that cloud-delivered protection is enabled. <br/>See [Enable cloud-delivered protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus). |
|
|
||||||
|Windows Defender Antivirus antimalware client |To make sure your client is up to date, using PowerShell, run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps) cmdlet as an administrator. In the **AMProductVersion** line, you should see **4.18.2001.10** or above. |
|
|
||||||
|Windows Defender Antivirus engine |To make sure your engine is up to date, using PowerShell, run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps) cmdlet as an administrator. In the **AMEngineVersion** line, you should see **1.1.16700.2** or above. |
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> To get the best protection value, make sure Windows Defender Antivirus is configured to receive regular updates and other essential features, such as behavioral monitoring, IOfficeAV, tamper protection, and more. See [Protect security settings with tamper protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection).
|
|
||||||
|
|
||||||
|
|
||||||
## Frequently asked questions
|
|
||||||
|
|
||||||
### Will shadow protection have any impact on a user's antivirus protection?
|
|
||||||
|
|
||||||
No. Shadow protection does not affect third-party antivirus protection running on users' machines. Shadow protection kicks in if the primary antivirus solution misses something, or if there is post-breach detection. Shadow protection works just like Windows Defender Antivirus in passive mode with the additional steps of blocking and remediating malicious items detected.
|
|
||||||
|
|
||||||
### Why do I need to keep Windows Defender Antivirus up to date?
|
|
||||||
|
|
||||||
Because Windows Defender Antivirus detects and remediates malicious items, it’s important to keep it up to date to leverage the latest machine learning models, behavioral detections, and heuristics for best results. The [Microsoft Defender ATP](https://docs.microsoft.com/windows/security/threat-protection) stack of capabilities work in an integrated manner, and to get best protection value, you should keep Windows Defender Antivirus up to date.
|
|
||||||
|
|
||||||
### Why do we need cloud protection on?
|
|
||||||
|
|
||||||
Cloud protection is needed to turn on the feature on the device. Cloud protection allows [Microsoft Defender ATP](https://docs.microsoft.com/windows/security/threat-protection) to deliver the latest and greatest protection based on the optics received, along with behavioral and machine learning models.
|
|
||||||
|
|
||||||
### Can I participate in the private preview of shadow protection?
|
|
||||||
|
|
||||||
If you would like to participate in our private preview program, please send email to `shwjha@microsoft.com`.
|
|
||||||
|
|
||||||
## See also
|
|
||||||
|
|
||||||
- [Better together: Windows Defender Antivirus and Microsoft Defender Advanced Threat Protection](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/why-use-microsoft-antivirus)
|
|
||||||
|
|
@ -25,9 +25,9 @@ manager: dansimp
|
|||||||
## Overview
|
## Overview
|
||||||
|
|
||||||
Windows Defender Antivirus is automatically enabled and installed on endpoints and devices that are running Windows 10. But what happens when another antivirus/antimalware solution is used? It depends on whether you're using [Microsoft Defender ATP](https://docs.microsoft.com/windows/security/threat-protection) together with your antivirus protection.
|
Windows Defender Antivirus is automatically enabled and installed on endpoints and devices that are running Windows 10. But what happens when another antivirus/antimalware solution is used? It depends on whether you're using [Microsoft Defender ATP](https://docs.microsoft.com/windows/security/threat-protection) together with your antivirus protection.
|
||||||
- When endpoints and devices are protected with a non-Microsoft antivirus/antimalware solution, and Microsoft Defender ATP is not used, Windows Defender Antivirus automatically goes into disabled mode.
|
- If your organization's endpoints and devices are protected with a non-Microsoft antivirus/antimalware solution, and Microsoft Defender ATP is not used, then Windows Defender Antivirus automatically goes into disabled mode.
|
||||||
- If your organization is using Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) together with a non-Microsoft antivirus/antimalware solution, then Windows Defender Antivirus automatically goes into passive mode. (Real time protection and threats are not remediated by Windows Defender Antivirus.)
|
- If your organization is using Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) together with a non-Microsoft antivirus/antimalware solution, then Windows Defender Antivirus automatically goes into passive mode. (Real-time protection and threats are not remediated by Windows Defender Antivirus.)
|
||||||
- If your organization is using Microsoft Defender ATP together with a non-Microsoft antivirus/antimalware solution, and you have [shadow protection (currently in private preview)](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/shadow-protection), then Windows Defender Antivirus runs in the background and blocks/remediates malicious items that are detected, such as during a post-breach attack.
|
- If your organization is using Microsoft Defender ATP together with a non-Microsoft antivirus/antimalware solution, and you have [EDR in block mode](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/shadow-protection) (currently in private preview) enabled, then Windows Defender Antivirus runs in the background and blocks/remediates malicious items that are detected, such as during a post-breach attack.
|
||||||
|
|
||||||
## Antivirus and Microsoft Defender ATP
|
## Antivirus and Microsoft Defender ATP
|
||||||
|
|
||||||
@ -69,12 +69,12 @@ The following table summarizes the functionality and features that are available
|
|||||||
|--|--|--|--|--|--|
|
|--|--|--|--|--|--|
|
||||||
|Active mode <br/><br/> |Yes |No |Yes |Yes |Yes |
|
|Active mode <br/><br/> |Yes |No |Yes |Yes |Yes |
|
||||||
|Passive mode |No |No |Yes |No |Yes |
|
|Passive mode |No |No |Yes |No |Yes |
|
||||||
|[Shadow protection enabled](shadow-protection.md) |No |No |Yes |Yes |Yes |
|
|[EDR in block mode enabled](shadow-protection.md) |No |No |Yes |Yes |Yes |
|
||||||
|Automatic disabled mode |No |Yes |No |No |No |
|
|Automatic disabled mode |No |Yes |No |No |No |
|
||||||
|
|
||||||
- In Active mode, Windows Defender Antivirus is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files are scanned and threats remediated, and detection information are reported in your configuration tool (such as Configuration Manager or the Windows Defender Antivirus app on the machine itself).
|
- In Active mode, Windows Defender Antivirus is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files are scanned and threats remediated, and detection information are reported in your configuration tool (such as Configuration Manager or the Windows Defender Antivirus app on the machine itself).
|
||||||
- In Passive mode, Windows Defender Antivirus is not used as the antivirus app, and threats are not remediated by Windows Defender Antivirus. Files are scanned and reports are provided for threat detections which are shared with the Microsoft Defender ATP service.
|
- In Passive mode, Windows Defender Antivirus is not used as the antivirus app, and threats are not remediated by Windows Defender Antivirus. Files are scanned and reports are provided for threat detections which are shared with the Microsoft Defender ATP service.
|
||||||
- When [shadow protection (currently in private preview)](shadow-protection.md) is turned on, Windows Defender Antivirus is not used as the primary antivirus solution, but can still detect and remediate malicious items.
|
- When [EDR in block mode](../microsoft-defender-atp/edr-in-block-mode.md) (currently in private preview) is turned on, Windows Defender Antivirus is not used as the primary antivirus solution, but can still detect and remediate malicious items.
|
||||||
- In Automatic disabled mode, Windows Defender Antivirus is not used as the antivirus app. Files are not scanned and threats are not remediated.
|
- In Automatic disabled mode, Windows Defender Antivirus is not used as the antivirus app. Files are not scanned and threats are not remediated.
|
||||||
|
|
||||||
## Keep the following points in mind
|
## Keep the following points in mind
|
||||||
@ -95,4 +95,4 @@ If you uninstall the other product, and choose to use Windows Defender Antivirus
|
|||||||
|
|
||||||
- [Windows Defender Antivirus in Windows 10](windows-defender-antivirus-in-windows-10.md)
|
- [Windows Defender Antivirus in Windows 10](windows-defender-antivirus-in-windows-10.md)
|
||||||
- [Windows Defender Antivirus on Windows Server 2016 and 2019](windows-defender-antivirus-on-windows-server-2016.md)
|
- [Windows Defender Antivirus on Windows Server 2016 and 2019](windows-defender-antivirus-on-windows-server-2016.md)
|
||||||
- [Shadow protection in next-generation protection](shadow-protection.md)
|
- [EDR in block mode](../microsoft-defender-atp/edr-in-block-mode.md)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user