mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-17 11:23:45 +00:00
Cut images showing old brand name
Per Deniseb, but images showing the old Windows Defender Antivirus and/or Windows Defender Offline name. See task 4116148.
This commit is contained in:
@ -87,9 +87,7 @@ Download the file by visiting the following link:
|
||||
>[!NOTE]
|
||||
>This file is not an actual piece of malware. It is a fake file that is designed to test if you are properly connected to the cloud.
|
||||
|
||||
If you are properly connected, you will see a warning Microsoft Defender Antivirus notification:
|
||||
|
||||

|
||||
If you are properly connected, you will see a warning Microsoft Defender Antivirus notification.
|
||||
|
||||
If you are using Microsoft Edge, you'll also see a notification message:
|
||||
|
||||
@ -107,9 +105,7 @@ You will also see a detection under **Quarantined threats** in the **Scan histor
|
||||
|
||||

|
||||
|
||||
3. Under the **Quarantined threats** section, click the **See full history** label to see the detected fake malware:
|
||||
|
||||

|
||||
3. Under the **Quarantined threats** section, click the **See full history** label to see the detected fake malware.
|
||||
|
||||
>[!NOTE]
|
||||
>Versions of Windows 10 before version 1703 have a different user interface. See [Microsoft Defender Antivirus in the Windows Security app](microsoft-defender-security-center-antivirus.md).
|
||||
|
@ -38,7 +38,6 @@ To enable and configure always-on protection:
|
||||
2. Under **Best match**, click **Edit group policy** to launch **Local Group Policy Editor**.
|
||||

|
||||
2. In the left pane of **Local Group Policy Editor**, expand the tree to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
|
||||

|
||||
3. Configure the Microsoft Defender Antivirus antimalware service policy settings. To do this:
|
||||
1. In the **Microsoft Defender Antivirus** details pane on right, double-click the policy setting as specified in the following table:
|
||||
|
||||
@ -46,14 +45,12 @@ To enable and configure always-on protection:
|
||||
|-----------------------------|------------------------|-------------------------------|
|
||||
| Allow antimalware service to startup with normal priority | You can lower the priority of the Microsoft Defender Antivirus engine, which may be useful in lightweight deployments where you want to have as lean a startup process as possible. This may impact protection on the endpoint. | Enabled
|
||||
| Allow antimalware service to remain running always | If protection updates have been disabled, you can set Microsoft Defender Antivirus to still run. This lowers the protection on the endpoint. | Disabled |
|
||||
|
||||
2. Configure the setting as appropriate, and click **OK**.
|
||||
3. Repeat the previous steps for each setting in the table.
|
||||
|
||||
4. Configure the Microsoft Defender Antivirus real-time protection policy settings. To do this:
|
||||
1. In the **Microsoft Defender Antivirus** details pane, double-click **Real-time Protection**. Or, from the **Microsoft Defender Antivirus** tree on left pane, click **Real-time Protection**.
|
||||

|
||||
2. In the **Real-time Protection** details pane on right, double-click the policy setting as specified in the following table:
|
||||
2. In the **Real-time Protection** details pane on right, double-click the policy setting as specified in the following table:
|
||||
|
||||
| Setting | Description | Default setting |
|
||||
|-----------------------------|------------------------|-------------------------------|
|
||||
|
@ -39,18 +39,12 @@ If Microsoft Defender Antivirus is enabled, the usual options will appear to con
|
||||
|
||||

|
||||
|
||||
If another antivirus product is installed and working correctly, Microsoft Defender Antivirus will disable itself. The Windows Security app will change the **Virus & threat protection** section to show status about the AV product, and provide a link to the product's configuration options:
|
||||
If another antivirus product is installed and working correctly, Microsoft Defender Antivirus will disable itself. The Windows Security app will change the **Virus & threat protection** section to show status about the AV product, and provide a link to the product's configuration options.
|
||||
|
||||

|
||||
|
||||
Underneath any third party AV products, a new link will appear as **Microsoft Defender Antivirus options**. Clicking this link will expand to show the toggle that enables limited periodic scanning.
|
||||
|
||||

|
||||
Underneath any third party AV products, a new link will appear as **Microsoft Defender Antivirus options**. Clicking this link will expand to show the toggle that enables limited periodic scanning. Note that the limited periodic option is a toggle to enable or disable periodic scanning.
|
||||
|
||||
Sliding the switch to **On** will show the standard Microsoft Defender AV options underneath the third party AV product. The limited periodic scanning option will appear at the bottom of the page.
|
||||
|
||||

|
||||
|
||||
## Related articles
|
||||
|
||||
- [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md)
|
||||
|
@ -61,9 +61,7 @@ In Windows Server 2016, the **Add Roles and Features Wizard** looks like this:
|
||||
|
||||

|
||||
|
||||
In Windows Server 2019, the **Add Roles and Feature Wizard** looks like this:
|
||||
|
||||

|
||||
In Windows Server 2019, the **Add Roles and Feature Wizard** looks much the same.
|
||||
|
||||
### Turn on the GUI using PowerShell
|
||||
|
||||
|
@ -62,9 +62,7 @@ The prompt can occur via a notification, similar to the following:
|
||||
|
||||

|
||||
|
||||
The user will also be notified within the Windows Defender client:
|
||||
|
||||

|
||||
The user will also be notified within the Windows Defender client.
|
||||
|
||||
In Configuration Manager, you can identify the status of endpoints by navigating to **Monitoring > Overview > Security > Endpoint Protection Status > System Center Endpoint Protection Status**.
|
||||
|
||||
|
@ -112,10 +112,6 @@ You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-
|
||||
|
||||
5. Assign the profile to one or more groups.
|
||||
|
||||
Here's what you see in the Windows Security app:
|
||||
|
||||

|
||||
|
||||
### Are you using Windows OS 1709, 1803, or 1809?
|
||||
|
||||
If you are using Windows 10 OS [1709](https://docs.microsoft.com/windows/release-information/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-information/status-windows-10-1803), or [1809](https://docs.microsoft.com/windows/release-information/status-windows-10-1809-and-windows-server-2019), you won't see **Tamper Protection** in the Windows Security app. In this case, you can use PowerShell to determine whether tamper protection is enabled.
|
||||
|
Reference in New Issue
Block a user