|
|
|
@ -9,10 +9,11 @@ ms.mktglfcycl: manage
|
|
|
|
|
ms.sitesec: library
|
|
|
|
|
ms.pagetype: security
|
|
|
|
|
ms.localizationpriority: medium
|
|
|
|
|
author: dansimp
|
|
|
|
|
ms.author: dansimp
|
|
|
|
|
author: denisebmsft
|
|
|
|
|
ms.author: deniseb
|
|
|
|
|
ms.reviewer:
|
|
|
|
|
manager: dansimp
|
|
|
|
|
ms.custom: nextgen
|
|
|
|
|
---
|
|
|
|
|
|
|
|
|
|
# Enable block at first sight
|
|
|
|
@ -21,16 +22,12 @@ manager: dansimp
|
|
|
|
|
|
|
|
|
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
|
|
|
|
|
|
|
|
|
Block at first sight is a feature of next gen protection that provides a way to detect and block new malware within seconds.
|
|
|
|
|
Block at first sight is a feature of next-generation protection that provides a way to detect and block new malware within seconds. This protection is enabled by default when certain prerequisite settings are also enabled. In most cases, these prerequisite settings are also enabled by default, so the feature is running without any intervention.
|
|
|
|
|
|
|
|
|
|
It is enabled by default when certain pre-requisite settings are also enabled. In most cases, these pre-requisite settings are also enabled by default, so the feature is running without any intervention.
|
|
|
|
|
|
|
|
|
|
You can [specify how long the file should be prevented from running](configure-cloud-block-timeout-period-windows-defender-antivirus.md) while the cloud-based protection service analyzes the file.
|
|
|
|
|
|
|
|
|
|
You can also [customize the message displayed on users' desktops](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information) when a file is blocked. You can change the company name, contact information, and message URL.
|
|
|
|
|
You can [specify how long the file should be prevented from running](configure-cloud-block-timeout-period-windows-defender-antivirus.md) while the cloud-based protection service analyzes the file. And, you can [customize the message displayed on users' desktops](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-security-center/wdsc-customize-contact-information) when a file is blocked. You can change the company name, contact information, and message URL.
|
|
|
|
|
|
|
|
|
|
>[!TIP]
|
|
|
|
|
>You can also visit the Microsoft Defender ATP demo website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the features are working and see how they work.
|
|
|
|
|
>Visit the Microsoft Defender ATP demo website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the features are working and see how they work.
|
|
|
|
|
|
|
|
|
|
## How it works
|
|
|
|
|
|
|
|
|
@ -67,7 +64,7 @@ Block at first sight requires a number of settings to be configured correctly or
|
|
|
|
|
|
|
|
|
|

|
|
|
|
|
|
|
|
|
|
> [!Warning]
|
|
|
|
|
> [!WARNING]
|
|
|
|
|
> Setting the file blocking level to **High** will apply a strong level of detection. In the unlikely event that it causes a false positive detection of legitimate files, use the option to [restore the quarantined files](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus).
|
|
|
|
|
|
|
|
|
|
For more information about configuring Windows Defender Antivirus device restrictions in Intune, see [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/intune/device-restrictions-configure).
|
|
|
|
@ -77,18 +74,24 @@ For a list of Windows Defender Antivirus device restrictions in Intune, see [Dev
|
|
|
|
|
### Enable block at first sight with SCCM
|
|
|
|
|
|
|
|
|
|
1. In System Center Configuration Manager, click **Assets and Compliance** > **Endpoint Protection** > **AntiMalware Policies**.
|
|
|
|
|
1. Click **Home** > **Create Antimalware Policy**.
|
|
|
|
|
1. Enter a name and a description, and add these settings:
|
|
|
|
|
|
|
|
|
|
2. Click **Home** > **Create Antimalware Policy**.
|
|
|
|
|
|
|
|
|
|
3. Enter a name and a description, and add these settings:
|
|
|
|
|
- **Real time protection**
|
|
|
|
|
- **Advanced**
|
|
|
|
|
- **Cloud Protection Service**
|
|
|
|
|
1. In the left column, click **Real time protection**, set **Enable real-time protection** to **Yes**, and set **Scan system files** to **Scan incoming and outgoing files**.
|
|
|
|
|
|
|
|
|
|
4. In the left column, click **Real time protection**, set **Enable real-time protection** to **Yes**, and set **Scan system files** to **Scan incoming and outgoing files**.
|
|
|
|
|

|
|
|
|
|
1. Click **Advanced**, set **Enable real-time protection** to **Yes**, and set **Scan system files** to **Scan incoming and outgoing files**.
|
|
|
|
|
|
|
|
|
|
5. Click **Advanced**, set **Enable real-time protection** to **Yes**, and set **Scan system files** to **Scan incoming and outgoing files**.
|
|
|
|
|

|
|
|
|
|
1. Click **Cloud Protection Service**, set **Cloud Protection Service membership type** to **Advanced membership**, set **Level for blocking malicious files** to **High**, and set **Allow extended cloud check to block and scan suspicious files for up to (seconds)** to **50** seconds.
|
|
|
|
|
|
|
|
|
|
6. Click **Cloud Protection Service**, set **Cloud Protection Service membership type** to **Advanced membership**, set **Level for blocking malicious files** to **High**, and set **Allow extended cloud check to block and scan suspicious files for up to (seconds)** to **50** seconds.
|
|
|
|
|

|
|
|
|
|
1. Click **OK** to create the policy.
|
|
|
|
|
|
|
|
|
|
7. Click **OK** to create the policy.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### Confirm block at first sight is enabled with Group Policy
|
|
|
|
@ -97,25 +100,20 @@ For a list of Windows Defender Antivirus device restrictions in Intune, see [Dev
|
|
|
|
|
|
|
|
|
|
2. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
|
|
|
|
|
|
|
|
|
3. Expand the tree to **Windows components > Windows Defender Antivirus > MAPS** and configure the following Group Policies:
|
|
|
|
|
3. Expand the tree to **Windows components** > **Windows Defender Antivirus** > **MAPS**, configure the following Group Policies, and then click **OK**:
|
|
|
|
|
|
|
|
|
|
1. Double-click **Join Microsoft MAPS** and ensure the option is set to **Enabled**. Click **OK**.
|
|
|
|
|
- Double-click **Join Microsoft MAPS** and ensure the option is set to **Enabled**. Click **OK**.
|
|
|
|
|
|
|
|
|
|
2. Double-click **Send file samples when further analysis is required** and ensure the option is set to **Enabled** and the additional options are either of the following:
|
|
|
|
|
- Double-click **Send file samples when further analysis is required** and ensure the option is set to **Enabled** and the additional options are either **Send safe samples (1)** or **Send all samples (3)**.
|
|
|
|
|
|
|
|
|
|
- Send safe samples (1)
|
|
|
|
|
- Send all samples (3)
|
|
|
|
|
> [!WARNING]
|
|
|
|
|
> Setting to **Always prompt (0)** will lower the protection state of the device. Setting to **Never send (2)** means block at first sight will not function.
|
|
|
|
|
|
|
|
|
|
> [!WARNING]
|
|
|
|
|
> Setting to 0 (Always Prompt) will lower the protection state of the device. Setting to 2 (Never send) means block at first sight will not function.
|
|
|
|
|
4. In the **Group Policy Management Editor**, expand the tree to **Windows components** > **Windows Defender Antivirus** > **Real-time Protection**:
|
|
|
|
|
|
|
|
|
|
3. Click **OK**.
|
|
|
|
|
1. Double-click **Scan all downloaded files and attachments** and ensure the option is set to **Enabled**, and then click **OK**.
|
|
|
|
|
|
|
|
|
|
4. In the **Group Policy Management Editor**, expand the tree to **Windows components > Windows Defender Antivirus > Real-time Protection**:
|
|
|
|
|
|
|
|
|
|
1. Double-click **Scan all downloaded files and attachments** and ensure the option is set to **Enabled**. Click **OK**.
|
|
|
|
|
|
|
|
|
|
2. Double-click **Turn off real-time protection** and ensure the option is set to **Disabled**. Click **OK**.
|
|
|
|
|
2. Double-click **Turn off real-time protection** and ensure the option is set to **Disabled**, and then click **OK**.
|
|
|
|
|
|
|
|
|
|
If you had to change any of the settings, you should re-deploy the Group Policy Object across your network to ensure all endpoints are covered.
|
|
|
|
|
|
|
|
|
@ -125,7 +123,7 @@ You can confirm that block at first sight is enabled in Windows Settings.
|
|
|
|
|
|
|
|
|
|
Block at first sight is automatically enabled as long as **Cloud-based protection** and **Automatic sample submission** are both turned on.
|
|
|
|
|
|
|
|
|
|
**Confirm Block at First Sight is enabled on individual clients**
|
|
|
|
|
### Confirm Block at First Sight is enabled on individual clients
|
|
|
|
|
|
|
|
|
|
1. Open the Windows Security app by clicking the shield icon in the task bar.
|
|
|
|
|
|
|
|
|
@ -136,7 +134,7 @@ Block at first sight is automatically enabled as long as **Cloud-based protectio
|
|
|
|
|
3. Confirm that **Cloud-based Protection** and **Automatic sample submission** are switched to **On**.
|
|
|
|
|
|
|
|
|
|
> [!NOTE]
|
|
|
|
|
> If the pre-requisite settings are configured and deployed using Group Policy, the settings described in this section will be greyed-out and unavailable for use on individual endpoints. Changes made through a Group Policy Object must first be deployed to individual endpoints before the setting will be updated in Windows Settings.
|
|
|
|
|
> If the prerequisite settings are configured and deployed using Group Policy, the settings described in this section will be greyed-out and unavailable for use on individual endpoints. Changes made through a Group Policy Object must first be deployed to individual endpoints before the setting will be updated in Windows Settings.
|
|
|
|
|
|
|
|
|
|
### Validate block at first sight is working
|
|
|
|
|
|
|
|
|
@ -147,20 +145,20 @@ You can validate that the feature is working by following the steps outlined in
|
|
|
|
|
> [!WARNING]
|
|
|
|
|
> Disabling block at first sight will lower the protection state of the endpoint and your network.
|
|
|
|
|
|
|
|
|
|
You may choose to disable block at first sight if you want to retain the pre-requisite settings without using block at first sight protection. You might wish to do this if you are experiencing latency issues or you want to test the feature's impact on your network.
|
|
|
|
|
You may choose to disable block at first sight if you want to retain the prerequisite settings without using block at first sight protection. You might wish to do this if you are experiencing latency issues or you want to test the feature's impact on your network.
|
|
|
|
|
|
|
|
|
|
**Disable block at first sight with Group Policy**
|
|
|
|
|
### Disable block at first sight with Group Policy
|
|
|
|
|
|
|
|
|
|
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
|
|
|
|
|
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure, and then click **Edit**.
|
|
|
|
|
|
|
|
|
|
2. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
|
|
|
|
|
|
|
|
|
3. Expand the tree through **Windows components > Windows Defender Antivirus > MAPS**.
|
|
|
|
|
3. Expand the tree through **Windows components** > **Windows Defender Antivirus** > **MAPS**.
|
|
|
|
|
|
|
|
|
|
4. Double-click **Configure the 'Block at First Sight' feature** and set the option to **Disabled**.
|
|
|
|
|
|
|
|
|
|
> [!NOTE]
|
|
|
|
|
> Disabling block at first sight will not disable or alter the pre-requisite group policies.
|
|
|
|
|
> Disabling block at first sight will not disable or alter the prerequisite group policies.
|
|
|
|
|
|
|
|
|
|
## Related topics
|
|
|
|
|
|
|
|
|
|