diff --git a/windows/keep-secure/WDAV-working/configure-notifications-windows-defender-antivirus.md b/windows/keep-secure/WDAV-working/configure-notifications-windows-defender-antivirus.md index 6e1d9d8f37..2244318943 100644 --- a/windows/keep-secure/WDAV-working/configure-notifications-windows-defender-antivirus.md +++ b/windows/keep-secure/WDAV-working/configure-notifications-windows-defender-antivirus.md @@ -38,7 +38,7 @@ You can also configure how standard notifications appear on endpoints, such as n You can configure the display of additional notifications, such as recent threat detection summaries, in the [Windows Defender Security Center app](windows-defender-security-center-antivirus.md) and with Group Policy. > [!NOTE] -> In Windows 10, version 1607, the feature was called **Enhanced notifications** and could be configured under **Windows Settings** > **Update & security** > **Windows Defender**. +> In Windows 10, version 1607 the feature was called **Enhanced notifications** and could be configured under **Windows Settings** > **Update & security** > **Windows Defender**. In Group Policy settings in all versions of Windows 10 it is called **Enhanced notifications**. > [!IMPORTANT] > Disabling additional notifications will not disable critical notifications, such as threat detection and remediation alerts. @@ -75,6 +75,8 @@ You can use Group Policy to: - Hide all notifications on endpoints - Hide reboot notifications on endpoints +Hiding notifications can be useful in situations where you cannot hide the entire Windows Defender AV interface. See [Prevent users from seeing or interacting with the Windows Defender AV user interface](prevent-end-user-interaction-windows-defender-antivirus.md) for more information. + > [!NOTE] > Hiding notifications will only occur on endpoints to which the policy has been deployed. Notifications related to actions that must be taken (such as a reboot) will still appear on the [System Center Configuration Manager Endpoint Protection monitoring dashboard and reports](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/monitor-endpoint-protection). diff --git a/windows/keep-secure/WDAV-working/prevent-end-user-interaction-windows-defender-antivirus.md b/windows/keep-secure/WDAV-working/prevent-end-user-interaction-windows-defender-antivirus.md index 65ef36cc1c..ce95481ff2 100644 --- a/windows/keep-secure/WDAV-working/prevent-end-user-interaction-windows-defender-antivirus.md +++ b/windows/keep-secure/WDAV-working/prevent-end-user-interaction-windows-defender-antivirus.md @@ -30,7 +30,7 @@ You can use Group Policy to prevent users on endpoints from seeing the Windows D ## Hide the Windows Defender Antivirus interface -In Windows 10, versions 1703, hiding the interface will prevent the Virus & threat protection tile from appearing in the Windows Defender Security Center app. +In Windows 10, versions 1703, hiding the interface will hide Windows Defender AV notifications and prevent the Virus & threat protection tile from appearing in the Windows Defender Security Center app. With the setting set to **Enabled**: @@ -40,6 +40,9 @@ With the setting set to **Disabled** or not configured: ![Scheenshot of Windows Defender Security Center showing the shield icon and virus and threat protection section](images/defender/wdav-headless-mode-off-1703.png) +>[!NOTE] +>Hiding the interface will also prevent Windows Defender AV notifications from appearing on the endpoint. Windows Defender Advanced Threat Protection notifications will still appear. You can also individually [Configure the notifications that appear on endpoints](configure-notifications-windows-defender-antivirus.md) + In earlier versions of Windows 10, the setting will hide the Windows Defender client interface. If the user attempts to open it, they will receive a warning "Your system administrator has restricted access to this app.":