mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-18 00:07:23 +00:00
added note to second page, prevent-changes-to-security...
This commit is contained in:
parent
29ec5c7ec5
commit
31a230b4c5
@ -28,6 +28,7 @@ ms.custom: nextgen
|
|||||||
During some kinds of cyber attacks, bad actors try to disable security features, such as anti-virus protection, on your machines. They do this to get easier access to your data, to install malware, or to otherwise exploit your data, identity, and devices. Tamper protection helps prevent this from occurring.
|
During some kinds of cyber attacks, bad actors try to disable security features, such as anti-virus protection, on your machines. They do this to get easier access to your data, to install malware, or to otherwise exploit your data, identity, and devices. Tamper protection helps prevent this from occurring.
|
||||||
|
|
||||||
With tamper protection, malicious apps are prevented from taking actions such as:
|
With tamper protection, malicious apps are prevented from taking actions such as:
|
||||||
|
|
||||||
- Disabling virus and threat protection
|
- Disabling virus and threat protection
|
||||||
- Disabling real-time protection
|
- Disabling real-time protection
|
||||||
- Turning off behavior monitoring
|
- Turning off behavior monitoring
|
||||||
@ -38,6 +39,7 @@ With tamper protection, malicious apps are prevented from taking actions such as
|
|||||||
### How it works
|
### How it works
|
||||||
|
|
||||||
Tamper protection essentially locks Microsoft Defender Antivirus and prevents your security settings from being changed through apps and methods such as:
|
Tamper protection essentially locks Microsoft Defender Antivirus and prevents your security settings from being changed through apps and methods such as:
|
||||||
|
|
||||||
- Configuring settings in Registry Editor on your Windows machine
|
- Configuring settings in Registry Editor on your Windows machine
|
||||||
- Changing settings through PowerShell cmdlets
|
- Changing settings through PowerShell cmdlets
|
||||||
- Editing or removing security settings through group policies
|
- Editing or removing security settings through group policies
|
||||||
@ -177,7 +179,7 @@ Your regular group policy doesn’t apply to tamper protection, and changes to M
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>A small delay in Group Policy (GPO) processing may occur if Group Policy settings include values that control Microsoft Defender Antivirus features protected by tamper protection. To avoid any potential delays, we recommend that you remove settings that control Microsoft Defender Antivirus related behavior from GPO and simply allow tamper protection to protect Microsoft Defender Antivirus settings. <br><br>
|
>A small delay in Group Policy (GPO) processing may occur if Group Policy settings include values that control Microsoft Defender Antivirus features protected by tamper protection. To avoid any potential delays, we recommend that you remove settings that control Microsoft Defender Antivirus related behavior from GPO and simply allow tamper protection to protect Microsoft Defender Antivirus settings. <br><br>
|
||||||
> Sample Microsoft Defender Antivirus settings:<br>
|
> Sample Microsoft Defender Antivirus settings:<br>
|
||||||
> Turn off Microsoft Defender Antivirus <br>
|
> Turn off Microsoft Defender Antivirus (**Note:** Only applies to devices that have not received the August 2020 update to Microsoft Defender Antivirus) <br>
|
||||||
> Computer Configuration\Administrative Templates\Windows Components\Windows Defender\
|
> Computer Configuration\Administrative Templates\Windows Components\Windows Defender\
|
||||||
Value DisableAntiSpyware = 0 <br><br>
|
Value DisableAntiSpyware = 0 <br><br>
|
||||||
>Turn off real-time protection<br>
|
>Turn off real-time protection<br>
|
||||||
@ -188,7 +190,6 @@ Value DisableRealtimeMonitoring = 0
|
|||||||
|
|
||||||
Configuring tamper protection in Intune can be targeted to your entire organization as well as to specific devices and user groups.
|
Configuring tamper protection in Intune can be targeted to your entire organization as well as to specific devices and user groups.
|
||||||
|
|
||||||
|
|
||||||
### Can I configure Tamper Protection in Microsoft Endpoint Configuration Manager?
|
### Can I configure Tamper Protection in Microsoft Endpoint Configuration Manager?
|
||||||
|
|
||||||
Currently we do not have support to manage Tamper Protection through Microsoft Endpoint Configuration Manager.
|
Currently we do not have support to manage Tamper Protection through Microsoft Endpoint Configuration Manager.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user