diff --git a/windows/keep-secure/TOC.md b/windows/keep-secure/TOC.md index 7a134f5b66..9aa05908ab 100644 --- a/windows/keep-secure/TOC.md +++ b/windows/keep-secure/TOC.md @@ -394,7 +394,7 @@ ### [Windows Defender in Windows 10](windows-defender-in-windows-10.md) #### [Update and manage Windows Defender in Windows 10](get-started-with-windows-defender-for-windows-10.md) #### [Configure Windows Defender in Windows 10](configure-windows-defender-for-windows-10.md) -#### [Troubleshoot Windows Defender in Windows 10](troubleshoot-windows-defender-for-windows-10.md) +#### [Troubleshoot Windows Defender in Windows 10](troubleshoot-windows-defender-in-windows-10.md) ## [Enterprise security guides](enterprise-security-guides-portal.md) ### [Control the health of Windows 10-based devices](protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md) ### [Device Guard deployment guide](device-guard-deployment-guide.md) diff --git a/windows/keep-secure/configure-windows-defender-in-windows-10 b/windows/keep-secure/configure-windows-defender-in-windows-10 new file mode 100644 index 0000000000..a8675aac21 --- /dev/null +++ b/windows/keep-secure/configure-windows-defender-in-windows-10 @@ -0,0 +1,223 @@ +--- +title: Configure Windows Defender in Windows 10 (Windows 10) +description: IT professionals can configure definition updates and cloud-based protection in Windows Defender in Windows 10 through Microsoft Active Directory and Windows Server Update Services (WSUS). +ms.assetid: 22649663-AC7A-40D8-B1F7-5CAD9E49653D +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: brianlic-msft +--- + +# Configure Windows Defender in Windows 10 + + +**Applies to** + +- Windows 10 + +IT professionals can configure definition updates and cloud-based protection in Windows Defender in Windows 10 through Microsoft Active Directory and Windows Server Update Services (WSUS). + +## Configure definition updates + + +It is important to update definitions regularly to ensure that your endpoints are protected. Definition updates can be configured to suit the requirements of your organization. + +Windows Defender supports the same updating options (such as using multiple definition sources) as other Microsoft endpoint protection products; for more information, see [Configuring Definition Updates](https://technet.microsoft.com/library/gg412502.aspx). + +When you configure multiple definition sources in Windows Defender, you can configure the fallback order using the following values through *Group Policy* settings: + +- InternalDefinitionUpdateServer - WSUS +- MicrosoftUpdateServer - Microsoft Update +- MMPC - [Microsoft Malware Protection Center definitions page](http://www.microsoft.com/security/portal/definitions/adl.aspx) +- FileShares - file share + +Read about deploying administrative template files for Windows Defender in the article [Description of the Windows Defender Group Policy administrative template settings](https://support.microsoft.com/kb/927367). + +You can also manage your Windows Defender update configuration settings through System Center Configuration Manager. See [How to Configure Definition Updates for Endpoint Protection in Configuration Manager](https://technet.microsoft.com/library/jj822983.aspx) for details. + +## Definition update logic + + +You can update Windows Defender definitions in four ways depending on your business requirements: + +- WSUS, the managed server. You can manage the distribution of updates that are released through Microsoft Update to computers in your enterprise environment; read more on the [Windows Server Update Services](https://technet.microsoft.com/windowsserver/bb332157.aspx) website. +- Microsoft Update, the unmanaged server. You can use this method to get regular updates from Microsoft Update. +- The [Microsoft Malware Protection Center definitions page](http://www.microsoft.com/security/portal/definitions/adl.aspx), as an alternate download location. You can use this method if you want to download the latest definitions. +- File share, where the definition package is downloaded. You can retrieve definition updates from a file share. The file share must be provisioned on a regular basis with the update files. + +## Update Windows Defender definitions through Active Directory and WSUS + + +This section details how to update Windows Defender definitions for Windows 10 endpoints through Active Directory and WSUS. + + ++++ + + + + + + + + + + + + + + + + + + + + + + + + +
MethodInstructions

WSUS

See [Software Updates and Windows Server Update Services Definition Updates](https://technet.microsoft.com/library/gg398036.aspx) in the [Configuring Definition Updates](https://technet.microsoft.com/library/gg412502.aspx) topic that also applies to Windows Defender.

Microsoft Update

Set the following fallback order Group Policy to enable Microsoft Update:

+
    +
  1. Open the Group Policy Editor.
  2. +
  3. In the Local Computer Policy tree, expand Computer Configuration, then Administrative Templates, then Windows Components, then Windows Defender.
  4. +
  5. Click on Signature Updates.
  6. +
  7. Double-click on Define the order of sources for downloading definition updates.

    +

    This will open the Define the order of sources for downloading definition updates window.

  8. +
  9. Click Enable.
  10. +
  11. In the Options pane, define the following Group Policy to enable Microsoft Update:

    +

    {MicrosoftUpdateServer}

    +

    "Define the order of sources for downloading definition updates" field

  12. +
  13. Click OK.

    +

    The window will close automatically.

  14. +

[Microsoft Malware Protection Center definitions page](http://www.microsoft.com/security/portal/definitions/adl.aspx)

Set the following fallback order Group Policy to enable Windows Defender to download updated signatures:

+
    +
  1. Open the Group Policy Editor.
  2. +
  3. In the Local Computer Policy tree, expand Computer Configuration, then Administrative Templates, then Windows Components, then Windows Defender.
  4. +
  5. Click on Signature Updates.
  6. +
  7. Double-click on Define the order of sources for downloading definition updates.

    +

    This will open the Define the order of sources for downloading definition updates window.

  8. +
  9. Click Enable.
  10. +
  11. In the Options pane, define the following Group Policy to enable Windows Defender to download updated signatures:

    +

    {MMPC}

    +

    "Define the order of sources for downloading definition updates" field

  12. +
  13. Click OK.

    +

    The window will close automatically.

  14. +

File share

+
    +
  1. Open the Group Policy Editor.
  2. +
  3. In the Local Computer Policy tree, expand Computer Configuration, then Administrative Templates, then Windows Components, then Windows Defender.
  4. +
  5. Click on Signature Updates.
  6. +
  7. Double-click on Define the order of sources for downloading definition updates.

    +

    This will open the Define the order of sources for downloading definition updates window:

  8. +
  9. Click Enable.
  10. +
  11. In the Options pane, define the following Group Policy to enable Windows Defender to download updated signatures:

    +

    {FileShares}

    +

    "Define the order of sources for downloading definition updates" field

  12. +
  13. Click OK.

    +

    The window will close automatically.

  14. +
  15. Double-click on Define file shares for downloading definition updates.

    +

    This will open the Define file shares for downloading definition updates window.

  16. +
  17. Click Enable.
  18. +
  19. In the Options pane, define the following Group Policy to specify the Universal Naming Convention (UNC) share source:

    +

    {\\unc1\\unc2} - where you define [unc] as the UNC shares.

    +

    "Define the file shares for downloading definition updates" field

  20. +
  21. Click OK.

    +

    The window will close automatically.

  22. +
+ +  + +## Manage cloud-based protection + + +Windows Defender offers improved cloud-based protection and threat intelligence for endpoint protection clients using the Microsoft Active Protection Service. Read more about the Microsoft Active Protection Service community in [Join the Microsoft Active Protection Service community](http://windows.microsoft.com/windows-8/join-maps-community). + +You can enable or disable the Microsoft Active Protection Service using *Group Policy* settings and administrative template files. + +More information on deploying administrative template files for Windows Defender is available in the article [Description of the Windows Defender Group Policy administrative template settings](https://support.microsoft.com/kb/927367). + +The Microsoft Active Protection Service can be configured with the following *Group Policy* settings: + +1. Open the **Group Policy Editor**. +2. In the **Local Computer Policy** tree, expand **Computer Configuration**, then **Administrative Templates**, then **Windows Components**, then **Windows Defender**. +3. Click on **MAPS**. +4. Double-click on **Join Microsoft MAPS**. +5. Select your configuration option from the **Join Microsoft MAPS** list. + **Note**  Any settings modified on an endpoint will be overridden by the administrator's policy setting. + +   + +Use the Windowsdefender.adm *Group Policy* template file to control the policy settings for Windows Defender in Windows 10: + +Policy setting: **Configure Microsoft SpyNet Reporting** +Registry key name: **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\SpyNet\\SpyNetReporting** +Policy description: **Adjusts membership in Microsoft Active Protection Service** + +You can also configure preferences using the following PowerShell parameters: + +- Turn Microsoft Active Protection Service off: *Set-MpPreference -MAPSReporting 0* +- Turn Microsoft Active Protection Service on: *Set-MpPreference -MAPSReporting 2* + +Read more about this in: + +- [Scripting with Windows PowerShell](https://technet.microsoft.com/library/bb978526.aspx) +- [Defender Cmdlets](https://technet.microsoft.com/library/dn433280.aspx) + +**Note**  Any information that Windows Defender collects is encrypted in transit to our servers, and then stored in secure facilities. Microsoft takes several steps to avoid collecting any information that directly identifies you, such as your name, email address, or account ID. + +  + +Read more about how to manage your privacy settings in [Setting your preferences for Windows 10 services](http://windows.microsoft.com/windows-10/services-setting-preferences). + +## Opt-in to Microsoft Update + + +You can use Microsoft Update to keep definitions on mobile computers running Windows Defender in Windows 10 up to date when they are not connected to the corporate network. If the mobile computer doesn't have a [Windows Server Update Service](https://technet.microsoft.com/windowsserver/bb332157.aspx) (WSUS) connection, the signatures will still come from Microsoft Update. This means that signatures can be pushed down (via Microsoft Update) even if WSUS overrides Windows Update. + +You need to opt-in to Microsoft Update on the mobile computer before it can retrieve the definition updates from Microsoft Update. + +There are two ways you can opt-in to Microsoft Update in Windows Defender for Windows 10: + +1. Use a VBScript to create a script, then run it on each computer in your network. +2. Manually opt-in every computer on your network through the **Settings** menu. + +You can create a VBScript and run it on each computer on your network; this is an efficient way to opt-in to Microsoft Update. + +**Use a VBScript to opt in to Microsoft Update** + +1. Use the instructions in the MSDN article [Opt-In to Microsoft Update](https://msdn.microsoft.com/library/windows/desktop/aa826676.aspx) to create the VBScript. +2. Run the VBScript you created on each computer in your network. + +You can manually opt-in each individual computer on your network to receive Microsoft Update. + +**Manually opt-in to Microsoft Update** + +1. Open **Windows Update** in **Update & security** settings on the computer you want to opt-in. +2. Click **Advanced** options. +3. Select the checkbox for **Give me updates for other Microsoft products when I update Windows**. + +## Schedule updates for Microsoft Update + + +Opting-in to Microsoft Update means that your system administrator can schedule updates to your mobile computer, so that it keeps up-to-date with the latest software versions and security definitions, even when you’re on the road. + +For more information on scheduling updates, see [Configure definition updates](https://technet.microsoft.com/library/mt622088.aspx#configure-definition-updates). + +## Related topics + + +[Update and manage Windows Defender in Windows 10](get-started-with-windows-defender-for-windows-10.md) + +[Troubleshoot Windows Defender in Windows 10](troubleshoot-windows-defender-for-windows-10.md) + +  + +  + + + + + diff --git a/windows/keep-secure/creating-a-device-guard-policy-for-signed-apps.md b/windows/keep-secure/creating-a-device-guard-policy-for-signed-apps.md index 9028d0b0c4..b0079da964 100644 --- a/windows/keep-secure/creating-a-device-guard-policy-for-signed-apps.md +++ b/windows/keep-secure/creating-a-device-guard-policy-for-signed-apps.md @@ -28,7 +28,7 @@ To create a code integrity policy, you'll first need to create a reference image **To create a code integrity policy based on a reference device** -1. On your reference device, start Windows PowerShell as an administrator. +1. On your reference device, start PowerShell as an administrator. 2. In PowerShell, initialize variables by typing: diff --git a/windows/keep-secure/get-started-with-windows-defender-for-windows-10.md b/windows/keep-secure/get-started-with-windows-defender-for-windows-10.md index 2ddba6821a..8c81ea50ad 100644 --- a/windows/keep-secure/get-started-with-windows-defender-for-windows-10.md +++ b/windows/keep-secure/get-started-with-windows-defender-for-windows-10.md @@ -1,6 +1,6 @@ --- title: Update and manage Windows Defender in Windows 10 (Windows 10) -description: IT professionals can manage Windows Defender on Windows 10 endpoints in their organization using Microsoft Active Directory or Windows Server Update Services (WSUS), apply updates to endpoints, and manage scans using Group Policy SettingsWindows Management Instrumentation (WMI)Windows PowerShell. +description: IT professionals can manage Windows Defender on Windows 10 endpoints in their organization using Microsoft Active Directory or Windows Server Update Services (WSUS), apply updates to endpoints, and manage scans using Group Policy SettingsWindows Management Instrumentation (WMI)PowerShell. ms.assetid: 045F5BF2-87D7-4522-97E1-C1D508E063A7 ms.prod: W10 ms.mktglfcycl: manage @@ -19,7 +19,7 @@ IT professionals can manage Windows Defender on Windows 10 endpoints in their o - Group Policy Settings - Windows Management Instrumentation (WMI) -- Windows PowerShell +- PowerShell ## Manage Windows Defender endpoints through Active Directory and WSUS @@ -112,7 +112,7 @@ Turn on email scanning with the following *Group Policy* settings: 3. Click **Scan**. 4. Double-click **Turn on e-mail scanning**. - This will open the **Turn on e-mail scanning** window: + This will open the **Turn on e-mail scanning** window: ![turn on e-mail scanning window](images/defender-scanemailfiles.png) 5. Select **Enabled**. 6. Click **OK** to apply changes. @@ -175,16 +175,16 @@ Turn on email scanning with the following *Group Policy* settings: 3. Click **Scan**. 4. Double-click **Scan archive files**. - This will open the **Scan archive files** window: + This will open the **Scan archive files** window: ![scan archive files window](images/defender-scanarchivefiles.png) 5. Select **Enabled**. 6. Click **OK** to apply changes. There are a number of archive scan settings in the **Scan** repository you can configure through *Group Policy*, for example: -- Maximum directory depth level into which archive files are unpacked during scanning -- Maximum size of archive files that will be scanned -- Maximum percentage CPU utilization permitted during a scan +- Maximum directory depth level into which archive files are unpacked during scanning ![specify the maximum depth to scan archive files window](images/defender-scanarchivedepth.png) +- Maximum size of archive files that will be scanned ![specify the maximum size of archive files to be scanned window](images/defender-scanarchivesize.png) +- Maximum percentage CPU utilization permitted during a scan ![specify the maximum percentage od cpu utilization during a scan window](images/defender-scanarchivecpu.png) ## Use WMI to disable archive scans @@ -220,7 +220,7 @@ In Endpoint Protection, you can use the advanced scanning options to configure a [Configure Windows Defender in Windows 10](configure-windows-defender-for-windows-10.md) -[Troubleshoot Windows Defender in Windows 10](troubleshoot-windows-defender-for-windows-10.md) +[Troubleshoot Windows Defender in Windows 10](troubleshoot-windows-defender-in-windows-10.md)   diff --git a/windows/keep-secure/getting-apps-to-run-on-device-guard-protected-devices.md b/windows/keep-secure/getting-apps-to-run-on-device-guard-protected-devices.md index 8ab0b6d888..2780dd8b05 100644 --- a/windows/keep-secure/getting-apps-to-run-on-device-guard-protected-devices.md +++ b/windows/keep-secure/getting-apps-to-run-on-device-guard-protected-devices.md @@ -46,7 +46,7 @@ You must run Package Inspector on a device that's running a temporary Code Integ **To create a catalog file for an existing app** -1. Start Windows PowerShell as an administrator, and create your temporary policy file by typing: +1. Start PowerShell as an administrator, and create your temporary policy file by typing: ``` syntax mkdir temp diff --git a/windows/keep-secure/images/defender-scanarchivecpu.png b/windows/keep-secure/images/defender-scanarchivecpu.png new file mode 100644 index 0000000000..03f469da10 Binary files /dev/null and b/windows/keep-secure/images/defender-scanarchivecpu.png differ diff --git a/windows/keep-secure/images/defender-scanarchivedepth.png b/windows/keep-secure/images/defender-scanarchivedepth.png new file mode 100644 index 0000000000..051b12d342 Binary files /dev/null and b/windows/keep-secure/images/defender-scanarchivedepth.png differ diff --git a/windows/keep-secure/images/defender-scanarchivefiles.png b/windows/keep-secure/images/defender-scanarchivefiles.png new file mode 100644 index 0000000000..64b8a47f65 Binary files /dev/null and b/windows/keep-secure/images/defender-scanarchivefiles.png differ diff --git a/windows/keep-secure/images/defender-scanarchivesize.png b/windows/keep-secure/images/defender-scanarchivesize.png new file mode 100644 index 0000000000..3c2d70974c Binary files /dev/null and b/windows/keep-secure/images/defender-scanarchivesize.png differ diff --git a/windows/keep-secure/images/defender-scanemailfiles.png b/windows/keep-secure/images/defender-scanemailfiles.png new file mode 100644 index 0000000000..8d03c9c1c2 Binary files /dev/null and b/windows/keep-secure/images/defender-scanemailfiles.png differ diff --git a/windows/keep-secure/images/defender-updatedefs2.png b/windows/keep-secure/images/defender-updatedefs2.png new file mode 100644 index 0000000000..2ec979e605 Binary files /dev/null and b/windows/keep-secure/images/defender-updatedefs2.png differ diff --git a/windows/keep-secure/implement-microsoft-passport-in-your-organization.md b/windows/keep-secure/implement-microsoft-passport-in-your-organization.md index 8eb850576b..b1d3e7528c 100644 --- a/windows/keep-secure/implement-microsoft-passport-in-your-organization.md +++ b/windows/keep-secure/implement-microsoft-passport-in-your-organization.md @@ -129,7 +129,7 @@ The following table lists the Group Policy settings that you can configure for P -Remote Passport +Remote Passport

Use Remote Passport

Note  Applies to desktop only. Phone sign-in is currently limited to select Technology Adoption Program (TAP) participants.
@@ -142,151 +142,118 @@ The following table lists the Group Policy settings that you can configure for P -

 

-

MDM policy settings for Passport

-

The following table lists the MDM policy settings that you can configure for Passport use in your workplace. These MDM policy settings use the PassportForWork configuration service provider (CSP).

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
PolicyScopeDefaultOptions
UsePassportForWorkDeviceTrue -

True: Passport will be provisioned for all users on the device.

-

False: Users will not be able to provision Passport.

-
Note  If Passport is enabled, and then the policy is changed to False, users who previously set up Passport can continue to use it, but will not be able to set up Passport on other devices.
-
 
-
RequireSecurityDeviceDeviceFalse -

True: Passport will only be provisioned using TPM.

-

False: Passport will be provisioned using TPM if available, and will be provisioned using software if TPM is not available.

-
Biometrics -

UseBiometrics

-
Device False -

True: Biometrics can be used as a gesture in place of a PIN for domain logon.

-

False: Only a PIN can be used as a gesture for domain logon.

-
-

FacialFeaturesUser

-

EnhancedAntiSpoofing

-
DeviceNot configured -

Not configured: users can choose whether to turn on enhanced anti-spoofing.

-

True: Enhanced anti-spoofing is required on devices which support it.

-

False: Users cannot turn on enhanced anti-spoofing.

-
PINComplexity
Digits Device or user2 -

1: Numbers are not allowed.

-

2: At least one number is required.

-
Lowercase letters Device or user1 -

1: Lowercase letters are not allowed.

-

2: At least one lowercase letter is required.

-
Maximum PIN length Device or user127 -

Maximum length that can be set is 127. Maximum length cannot be less than minimum setting.

-
Minimum PIN lengthDevice or user4 -

Minimum length that can be set is 4. Minimum length cannot be greater than maximum setting.

-
Expiration Device or user0 -

Integer value specifies the period of time (in days) that a PIN can be used before the system requires the user to change it. The largest number you can configure for this policy setting is 730. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then the user’s PIN will never expire. -

-
HistoryDevice or user0 -

Integer value that specifies the number of past PINs that can be associated to a user account that can’t be reused. The largest number you can configure for this policy setting is 50. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then storage of previous PINs is not required. -

-
Special charactersDevice or user1 -

1: Special characters are not allowed.

-

2: At least one special character is required.

-
Uppercase lettersDevice or user1 -

1: Uppercase letters are not allowed

-

2: At least one uppercase letter is required

-
Remote -

UseRemotePassport

-
Note  Applies to desktop only. Phone sign-in is currently limited to select Technology Adoption Program (TAP) participants.
-
 
-
Device or userFalse -

True: Remote Passport is enabled.

-

False: Remote Passport is disabled.

-
+ +## MDM policy settings for Passport + + +The following table lists the MDM policy settings that you can configure for Passport use in your workplace. These MDM policy settings use the [PassportForWork configuration service provider (CSP)](http://go.microsoft.com/fwlink/p/?LinkId=692070). + +Policy +Scope +Default +Options +UsePassportForWork +Device +True +True: Passport will be provisioned for all users on the device. + +False: Users will not be able to provision Passport. + +**Note**  If Passport is enabled, and then the policy is changed to False, users who previously set up Passport can continue to use it, but will not be able to set up Passport on other devices. + +  + +RequireSecurityDevice +Device +False +True: Passport will only be provisioned using TPM. + +False: Passport will be provisioned using TPM if available, and will be provisioned using software if TPM is not available. + +Biometrics +UseBiometrics + +Device +False +True: Biometrics can be used as a gesture in place of a PIN for domain logon. + +False: Only a PIN can be used as a gesture for domain logon. + +FacialFeaturesUser + +EnhancedAntiSpoofing + +Device +Not configured +Not configured: users can choose whether to turn on enhanced anti-spoofing. + +True: Enhanced anti-spoofing is required on devices which support it. + +False: Users cannot turn on enhanced anti-spoofing. + +PINComplexity +Digits +Device or user +2 +1: Numbers are not allowed. + +2: At least one number is required. + +Lowercase letters +Device or user +1 +1: Lowercase letters are not allowed. + +2: At least one lowercase letter is required. + +Maximum PIN length +Device or user +127 +Maximum length that can be set is 127. Maximum length cannot be less than minimum setting. + +Minimum PIN length +Device or user +4 +Minimum length that can be set is 4. Minimum length cannot be greater than maximum setting. + +Expiration +Device or user +0 +Integer value specifies the period of time (in days) that a PIN can be used before the system requires the user to change it. The largest number you can configure for this policy setting is 730. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then the user’s PIN will never expire. + +History +Device or user +0 +Integer value that specifies the number of past PINs that can be associated to a user account that can’t be reused. The largest number you can configure for this policy setting is 50. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then storage of previous PINs is not required. + +Special characters +Device or user +1 +1: Special characters are not allowed. + +2: At least one special character is required. + +Uppercase letters +Device or user +1 +1: Uppercase letters are not allowed + +2: At least one uppercase letter is required + +Remote +UseRemotePassport + +**Note**  Applies to desktop only. Phone sign-in is currently limited to select Technology Adoption Program (TAP) participants. + +  + +Device or user +False +True: [Remote Passport](prepare-people-to-use-microsoft-passport.md#bmk-remote) is enabled. + +False: [Remote Passport](prepare-people-to-use-microsoft-passport.md#bmk-remote) is disabled. + +  **Note**   If policy is not configured to explicitly require letters or special characters, users will be restricted to creating a numeric PIN. diff --git a/windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md b/windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md new file mode 100644 index 0000000000..dbf51334b0 --- /dev/null +++ b/windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md @@ -0,0 +1,3304 @@ +--- +title: Troubleshoot Windows Defender in Windows 10 (Windows 10) +description: IT professionals can review information about event IDs in Windows Defender for Windows 10 and see any relevant action they can take. +ms.assetid: EE488CC1-E340-4D47-B50B-35BD23CB4D70 +ms.prod: W10 +ms.mktglfcycl: manage +ms.sitesec: library +author: brianlic-msft +--- + +# Troubleshoot Windows Defender in Windows 10 + + +**Applies to** + +- Windows 10 + +IT professionals can review information about *event IDs* in Windows Defender for Windows 10 and see any relevant action they can take. + +## Windows Defender client *event IDs* + + +This section provides the following information about Windows Defender client events: + +- The text of the message as it appears in the event +- The name of the source of the message +- The symbolic name that identifies each message in the programming source code +- Additional information about the message + +Use the information in this table to help troubleshoot Windows Defender client events; these are located in the **Windows Event Viewer**, under **Windows Logs**. + +**To view a Windows Defender client event** + +1. Open **Event Viewer**. +2. In the console tree, expand **Applications and Services Logs**, then **Microsoft**, then **Windows**, then **Windows Defender**. +3. Double-click on **Operational**. +4. In the details pane, view the list of individual events to find your event. +5. Click the event to see specific details about an event in the lower pane, under the **General** and **Details** tabs. + +You can find a complete list of the Microsoft antimalware *event IDs*, the symbol, and the description of each ID in [Windows Server Antimalware Events TechNet](https://technet.microsoft.com/library/dn913615.aspx). + +  + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Event ID: 1000 +

Symbolic name:

+
+

MALWAREPROTECTION_SCAN_STARTED

+
+

Message:

+
+

An antimalware scan started. +

+
+

Description:

+
+

+

+
Scan ID: <ID number of the relevant scan.>
+
Scan Type: <Scan type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
+
+
Scan Parameters: <Scan parameters>, for example:
    +
  • Full scan
  • +
  • Quick scan
  • +
  • Customer scan
  • +
+
+
Scan Resources: <Resources (such as files/directories/BHO) that were scanned.>
+
User: <Domain>\<User>
+
+

+
Event ID: 1001 +

Symbolic name:

+
+

MALWAREPROTECTION_SCAN_COMPLETED

+
+

Message:

+
+

An antimalware scan finished.

+
+

Description:

+
+

+

+
Scan ID: <ID number of the relevant scan.>
+
Scan Type: <Scan type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
+
+
Scan Parameters: <Scan parameters>, for example:
    +
  • Full scan
  • +
  • Quick scan
  • +
  • Customer scan
  • +
+
+
User: <Domain>\<User>
+
Scan Time: <The duration of a scan.>
+
+

+
Event ID: 1002 +

Symbolic name:

+
+

MALWAREPROTECTION_SCAN_CANCELLED +

+
+

Message:

+
+

An antimalware scan was stopped before it finished. +

+
+

Description:

+
+

+

+
Scan ID: <ID number of the relevant scan.>
+
Scan Type: <Scan type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
+
+
Scan Parameters: <Scan parameters>, for example:
    +
  • Full scan
  • +
  • Quick scan
  • +
  • Customer scan
  • +
+
+
User: <Domain>\<User>
+
Scan Time: <The duration of a scan.>
+
+

+
Event ID: 1003 +

Symbolic name:

+
+

MALWAREPROTECTION_SCAN_PAUSED +

+
+

Message:

+
+

An antimalware scan was paused. +

+
+

Description:

+
+

+

+
Scan ID: <ID number of the relevant scan.>
+
Scan Type: <Scan type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
+
+
Scan Parameters: <Scan parameters>, for example:
    +
  • Full scan
  • +
  • Quick scan
  • +
  • Customer scan
  • +
+
+
User: <Domain>\<User>
+
+

+
Event ID: 1004 +

Symbolic name:

+
+

MALWAREPROTECTION_SCAN_RESUMED +

+
+

Message:

+
+

An antimalware scan was resumed. +

+
+

Description:

+
+

+

+
Scan ID: <ID number of the relevant scan.>
+
Scan Type: <Scan type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
+
+
Scan Parameters: <Scan parameters>, for example:
    +
  • Full scan
  • +
  • Quick scan
  • +
  • Customer scan
  • +
+
+
User: <Domain>\<User>
+
+

+
Event ID: 1005 +

Symbolic name:

+
+

MALWAREPROTECTION_SCAN_FAILED +

+
+

Message:

+
+

An antimalware scan failed. +

+
+

Description:

+
+

+

+
Scan ID: <ID number of the relevant scan.>
+
Scan Type: <Scan type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
+
+
Scan Parameters: <Scan parameters>, for example:
    +
  • Full scan
  • +
  • Quick scan
  • +
  • Customer scan
  • +
+
+
User: <Domain>\<User>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
+

+
+

User action:

+
+

The Windows Defender client encountered an error, and the current scan has stopped. The scan might fail due to a client-side issue. This event record includes the scan ID, type of scan (antivirus, antispyware, antimalware), scan parameters, the user that started the scan, the error code, and a description of the error. + +

+

To troubleshoot this event: +

    +
  1. Run the scan again.
  2. +
  3. If it fails in the same way, go to the Microsoft Support site, enter the error number in the Search box to look for the error code.
  4. +
  5. Contact Microsoft Technical Support. +
  6. +
+

+
Event ID: 1006 +

Symbolic name:

+
+

MALWAREPROTECTION_MALWARE_DETECTED +

+
+

Message:

+
+

The antimalware engine found malware or other potentially unwanted software. +

+
+

Description:

+
+

+

For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
Detection Origin: <Detection origin>, for example:
    +
  • Unknown
  • +
  • Local computer
  • +
  • Network share
  • +
  • Internet
  • +
  • Incoming traffic
  • +
  • Outgoing traffic
  • +
+
+
Detection Type: <Detection type>, for example:
    +
  • Heuristics
  • +
  • Generic
  • +
  • Concrete
  • +
  • Dynamic signature
  • +
+
+
Detection Source: <Detection source> for example:
    +
  • User: user initiated
  • +
  • System: system initiated
  • +
  • Real-time: real-time component initiated
  • +
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • +
  • NIS: Network inspection system
  • +
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • +
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • +
  • Remote attestation
  • +
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. +UAC
+
Status: <Status>
+
User: <Domain>\<User>
+
Process Name: <Process in the PID>
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
Event ID: 1007 +

Symbolic name:

+
+

MALWAREPROTECTION_MALWARE_ACTION_TAKEN +

+
+

Message:

+
+

The antimalware platform performed an action to protect your system from malware or other potentially unwanted software. +

+
+

Description:

+
+

+

Windows Defender has taken action to protect this machine from malware or other potentially unwanted software. For more information please see the following:

+
+
User: <Domain>\<User>
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Action: <Action>, for example:
    +
  • Clean: The resource was cleaned
  • +
  • Quarantine: The resource was quarantined
  • +
  • Remove: The resource was deleted
  • +
  • Allow: The resource was allowed to execute/exist
  • +
  • User defined: User defined action which is normally one from this list of actions that the user has specified
  • +
  • No action: No action
  • +
  • Block: The resource was blocked from executing
  • +
+
+
Status: <Status>
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
Event ID: 1008 +

Symbolic name:

+
+

MALWAREPROTECTION_MALWARE_ACTION_FAILED

+
+

Message:

+
+

The antimalware platform attempted to perform an action to protect your system from malware or other potentially unwanted software, but the action failed.

+
+

Description:

+
+

+

Windows Defender has encountered an error when taking action on malware or other potentially unwanted software. For more information please see the following:

+
+
User: <Domain>\<User>
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
Action: <Action>, for example:
    +
  • Clean: The resource was cleaned
  • +
  • Quarantine: The resource was quarantined
  • +
  • Remove: The resource was deleted
  • +
  • Allow: The resource was allowed to execute/exist
  • +
  • User defined: User defined action which is normally one from this list of actions that the user has specified
  • +
  • No action: No action
  • +
  • Block: The resource was blocked from executing
  • +
+
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Status: <Status>
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
Event ID: 1009 +

Symbolic name:

+
+

MALWAREPROTECTION_QUARANTINE_RESTORE +

+
+

Message:

+
+

The antimalware platform restored an item from quarantine. +

+
+

Description:

+
+

+

Windows Defender has restored an item from quarantine. For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
User: <Domain>\<User>
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
Event ID: 1010 +

Symbolic name:

+
+

MALWAREPROTECTION_QUARANTINE_RESTORE_FAILED +

+
+

Message:

+
+

The antimalware platform could not restore an item from quarantine. +

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to restore an item from quarantine. For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
User: <Domain>\<User>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
Event ID: 1011 +

Symbolic name:

+
+

MALWAREPROTECTION_QUARANTINE_DELETE

+
+

Message:

+
+

The antimalware platform deleted an item from quarantine. +

+
+

Description:

+
+

+

Windows Defender has deleted an item from quarantine. +For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
User: <Domain>\<User>
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
Event ID: 1012 +

Symbolic name:

+
+

MALWAREPROTECTION_QUARANTINE_DELETE_FAILED +

+
+

Message:

+
+

The antimalware platform could not delete an item from quarantine.

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to delete an item from quarantine. +For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
User: <Domain>\<User>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
Event ID: 1013 +

Symbolic name:

+
+

MALWAREPROTECTION_MALWARE_HISTORY_DELETE +

+
+

Message:

+
+

The antimalware platform deleted history of malware and other potentially unwanted software.

+
+

Description:

+
+

+

Windows Defender has removed history of malware and other potentially unwanted software.

+
+
Time: The time when the event occurred, for example when the history is purged. Note that this parameter is not used in threat events so that there is no confusion regarding whether it is remediation time or infection time. For those, we specifically call them as Action Time or Detection Time.
+
User: <Domain>\<User>
+
+

+
Event ID: 1014 +

Symbolic name:

+
+

MALWAREPROTECTION_MALWARE_HISTORY_DELETE_FAILED +

+
+

Message:

+
+

The antimalware platform could not delete history of malware and other potentially unwanted software.

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to remove history of malware and other potentially unwanted software.

+
+
Time: The time when the event occurred, for example when the history is purged. Note that this parameter is not used in threat events so that there is no confusion regarding whether it is remediation time or infection time. For those, we specifically call them as Action Time or Detection Time.
+
User: <Domain>\<User>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
+

+
Event ID: 1015 +

Symbolic name:

+
+

MALWAREPROTECTION_BEHAVIOR_DETECTED +

+
+

Message:

+
+

The antimalware platform detected suspicious behavior.

+
+

Description:

+
+

+

Windows Defender has detected a suspicious behavior. +For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
Detection Origin: <Detection origin>, for example: +
    +
  • Unknown
  • +
  • Local computer
  • +
  • Network share
  • +
  • Internet
  • +
  • Incoming traffic
  • +
  • Outgoing traffic
  • +
+
+
Detection Type: <Detection type>, for example:
    +
  • Heuristics
  • +
  • Generic
  • +
  • Concrete
  • +
  • Dynamic signature
  • +
+
+
Detection Source: <Detection source> for example:
    +
  • User: user initiated
  • +
  • System: system initiated
  • +
  • Real-time: real-time component initiated
  • +
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • +
  • NIS: Network inspection system
  • +
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • +
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • +
  • Remote attestation
  • +
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. +UAC
+
Status: <Status>
+
User: <Domain>\<User>
+
Process Name: <Process in the PID>
+
Signature ID: Enumeration matching severity.
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
Fidelity Label:
+
Target File Name: <File name> +Name of the file.
+
+

+
Event ID: 1116 +

Symbolic name:

+
+

MALWAREPROTECTION_STATE_MALWARE_DETECTED

+
+

Message:

+
+

The antimalware platform detected malware or other potentially unwanted software. +

+
+

Description:

+
+

+

Windows Defender has detected malware or other potentially unwanted software. +For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
Detection Origin: <Detection origin>, for example: +
    +
  • Unknown
  • +
  • Local computer
  • +
  • Network share
  • +
  • Internet
  • +
  • Incoming traffic
  • +
  • Outgoing traffic
  • +
+
+
Detection Type: <Detection type>, for example:
    +
  • Heuristics
  • +
  • Generic
  • +
  • Concrete
  • +
  • Dynamic signature
  • +
+
+
Detection Source: <Detection source> for example:
    +
  • User: user initiated
  • +
  • System: system initiated
  • +
  • Real-time: real-time component initiated
  • +
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • +
  • NIS: Network inspection system
  • +
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • +
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • +
  • Remote attestation
  • +
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. +UAC
+
User: <Domain>\<User>
+
Process Name: <Process in the PID>
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
+

User action:

+
+

No action is required. Windows Defender can suspend and take routine action on this threat. If you want to remove the threat manually, in the Windows Defender interface, click Clean Computer.

+
Event ID: 1117 +

Symbolic name:

+
+

MALWAREPROTECTION_STATE_MALWARE_ACTION_TAKEN +

+
+

Message:

+
+

The antimalware platform performed an action to protect your system from malware or other potentially unwanted software. +

+
+

Description:

+
+

+

Windows Defender has taken action to protect this machine from malware or other potentially unwanted software. +For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
Detection Origin: <Detection origin>, for example: +
    +
  • Unknown
  • +
  • Local computer
  • +
  • Network share
  • +
  • Internet
  • +
  • Incoming traffic
  • +
  • Outgoing traffic
  • +
+
+
Detection Type: <Detection type>, for example:
    +
  • Heuristics
  • +
  • Generic
  • +
  • Concrete
  • +
  • Dynamic signature
  • +
+
+
Detection Source: <Detection source> for example:
    +
  • User: user initiated
  • +
  • System: system initiated
  • +
  • Real-time: real-time component initiated
  • +
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • +
  • NIS: Network inspection system
  • +
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • +
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • +
  • Remote attestation
  • +
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. +UAC
+
User: <Domain>\<User>
+
Process Name: <Process in the PID>
+
Action: <Action>, for example:
    +
  • Clean: The resource was cleaned
  • +
  • Quarantine: The resource was quarantined
  • +
  • Remove: The resource was deleted
  • +
  • Allow: The resource was allowed to execute/exist
  • +
  • User defined: User defined action which is normally one from this list of actions that the user has specified
  • +
  • No action: No action
  • +
  • Block: The resource was blocked from executing
  • +
+
+
Action Status: <Description of additional actions>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
+

User action:

+
+

No action is necessary. Windows Defender removed or quarantined a threat.

+
Event ID: 1118 +

Symbolic name:

+
+

MALWAREPROTECTION_STATE_MALWARE_ACTION_FAILED

+
+

Message:

+
+

The antimalware platform attempted to perform an action to protect your system from malware or other potentially unwanted software, but the action failed. +

+
+

Description:

+
+

+

Windows Defender has encountered a non-critical error when taking action on malware or other potentially unwanted software. +For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
Detection Origin: <Detection origin>, for example: +
    +
  • Unknown
  • +
  • Local computer
  • +
  • Network share
  • +
  • Internet
  • +
  • Incoming traffic
  • +
  • Outgoing traffic
  • +
+
+
Detection Type: <Detection type>, for example:
    +
  • Heuristics
  • +
  • Generic
  • +
  • Concrete
  • +
  • Dynamic signature
  • +
+
+
Detection Source: <Detection source> for example:
    +
  • User: user initiated
  • +
  • System: system initiated
  • +
  • Real-time: real-time component initiated
  • +
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • +
  • NIS: Network inspection system
  • +
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • +
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • +
  • Remote attestation
  • +
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. +UAC
+
User: <Domain>\<User>
+
Process Name: <Process in the PID>
+
Action: <Action>, for example:
    +
  • Clean: The resource was cleaned
  • +
  • Quarantine: The resource was quarantined
  • +
  • Remove: The resource was deleted
  • +
  • Allow: The resource was allowed to execute/exist
  • +
  • User defined: User defined action which is normally one from this list of actions that the user has specified
  • +
  • No action: No action
  • +
  • Block: The resource was blocked from executing
  • +
+
+
Action Status: <Description of additional actions>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
+

User action:

+
+

No action is necessary. Windows Defender failed to complete a task related to the malware remediation. This is not a critical failure.

+
Event ID: 1119 +

Symbolic name:

+
+

MALWAREPROTECTION_STATE_MALWARE_ACTION_CRITICALLY_FAILED +

+
+

Message:

+
+

The antimalware platform encountered a critical error when trying to take action on malware or other potentially unwanted software. There are more details in the event message.

+
+

Description:

+
+

+

Windows Defender has encountered a critical error when taking action on malware or other potentially unwanted software. +For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
Detection Origin: <Detection origin>, for example: +
    +
  • Unknown
  • +
  • Local computer
  • +
  • Network share
  • +
  • Internet
  • +
  • Incoming traffic
  • +
  • Outgoing traffic
  • +
+
+
Detection Type: <Detection type>, for example:
    +
  • Heuristics
  • +
  • Generic
  • +
  • Concrete
  • +
  • Dynamic signature
  • +
+
+
Detection Source: <Detection source> for example:
    +
  • User: user initiated
  • +
  • System: system initiated
  • +
  • Real-time: real-time component initiated
  • +
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • +
  • NIS: Network inspection system
  • +
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • +
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • +
  • Remote attestation
  • +
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. +UAC
+
User: <Domain>\<User>
+
Process Name: <Process in the PID>
+
Action: <Action>, for example:
    +
  • Clean: The resource was cleaned
  • +
  • Quarantine: The resource was quarantined
  • +
  • Remove: The resource was deleted
  • +
  • Allow: The resource was allowed to execute/exist
  • +
  • User defined: User defined action which is normally one from this list of actions that the user has specified
  • +
  • No action: No action
  • +
  • Block: The resource was blocked from executing
  • +
+
+
Action Status: <Description of additional actions>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
+

User action:

+
+

The Windows Defender client encountered this error due to critical issues. The endpoint might not be protected. Review the error description then follow the relevant User action steps below.

+ + + + + + + + + + + + + + + + + + + + + +
ActionUser action
+

Remove

+
+

Update the definitions then verify that the removal was successful.

+
+

Clean

+
+

Update the definitions then verify that the remediation was successful.

+
+

Quarantine

+
+

Update the definitions and verify that the user has permission to access the necessary resources.

+
+

Allow

+
+

Verify that the user has permission to access the necessary resources.

+
+

 

+

If this event persists:

    +
  1. Run the scan again.
  2. +
  3. If it fails in the same way, go to the Microsoft Support site, enter the error number in the Search box to look for the error code.
  4. +
  5. Contact Microsoft Technical Support. +
  6. +
+

+
Event ID: 1120 +

Symbolic name:

+
+

MALWAREPROTECTION_THREAT_HASH

+
+

Message:

+
+

Windows Defender has deduced the hashes for a threat resource.

+
+

Description:

+
+

+

Windows Defender client is up and running in a healthy state.

+
+
Current Platform Version: <Current platform version>
+
Threat Resource Path: <Path>
+
Hashes: <Hashes>
+
+

+
+
Note  This event will only be logged if the following policy is set: ThreatFileHashLogging unsigned.
+
 
+
Event ID: 1150 +

Symbolic name:

+
+

MALWAREPROTECTION_SERVICE_HEALTHY

+
+

Message:

+
+

If your antimalware platform reports status to a monitoring platform, this event indicates that the antimalware platform is running and in a healthy state. +

+
+

Description:

+
+

+

Windows Defender client is up and running in a healthy state.

+
+
Platform Version: <Current platform version>
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
+

User action:

+
+

No action is necessary. The Windows Defenderclient is in a healthy state. This event is reported on an hourly basis.

+
Event ID: 2000 +

Symbolic name:

+
+

MALWAREPROTECTION_SIGNATURE_UPDATED +

+
+

Message:

+
+

The antimalware definitions updated successfully. +

+
+

Description:

+
+

+

Windows Defender signature version has been updated.

+
+
Current Signature Version: <Current signature version>
+
Previous Signature Version: <Previous signature version>
+
Signature Type: <Signature type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
  • Network Inspection System
  • +
+
+
Update Type: <Update type>, either Full or Delta.
+
User: <Domain>\<User>
+
Current Engine Version: <Current engine version>
+
Previous Engine Version: <Previous engine version>
+
+

+
+

User action:

+
+

No action is necessary. The Windows Defender client is in a healthy state. This event is reported when signatures are successfully updated.

+
Event ID: 2001 +

Symbolic name:

+
+

MALWAREPROTECTION_SIGNATURE_UPDATE_FAILED

+
+

Message:

+
+

The antimalware definition update failed. +

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to update signatures.

+
+
New Signature Version: <New version number>
+
Previous Signature Version: <Previous signature version>
+
Update Source: <Update source>, for example: +
    +
  • Signature update folder
  • +
  • Internal definition update server
  • +
  • Microsoft Update Server
  • +
  • File share
  • +
  • Microsoft Malware Protection Center (MMPC)
  • +
+
+
Update Stage: <Update stage>, for example: +
    +
  • Search
  • +
  • Download
  • +
  • Install
  • +
+
+
Source Path: File share name for Universal Naming Convention (UNC), server name for Windows Server Update Services (WSUS)/Microsoft Update/ADL.
+
Signature Type: <Signature type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
  • Network Inspection System
  • +
+
+
Update Type: <Update type>, either Full or Delta.
+
User: <Domain>\<User>
+
Current Engine Version: <Current engine version>
+
Previous Engine Version: <Previous engine version>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
+

+
+

User action:

+
+

This error occurs when there is a problem updating definitions.

+

To troubleshoot this event: +

    +
  1. Update the definitions. Either:
      +
    1. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows Defender

      Or,

      +
    2. +
    3. Download the latest definitions from the Microsoft Malware Protection Center. + +

      Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

      +
    4. +
    +
  2. +
  3. Review the entries in the %Windir%\WindowsUpdate.log file for more information about this error.
  4. +
  5. Contact Microsoft Technical Support. +
  6. +
+

+
Event ID: 2002 +

Symbolic name:

+
+

MALWAREPROTECTION_ENGINE_UPDATED

+
+

Message:

+
+

The antimalware engine updated successfully. +

+
+

Description:

+
+

+

Windows Defender engine version has been updated.

+
+
Current Engine Version: <Current engine version>
+
Previous Engine Version: <Previous engine version>
+
Engine Type: <Engine type>, either antimalware engine or Network Inspection System engine.
+
User: <Domain>\<User>
+
+

+
+

User action:

+
+

No action is necessary. The Windows Defender client is in a healthy state. This event is reported when the antimalware engine is successfully updated.

+
Event ID: 2003 +

Symbolic name:

+
+

MALWAREPROTECTION_ENGINE_UPDATE_FAILED

+
+

Message:

+
+

The antimalware engine update failed. +

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to update the engine.

+
+
New Engine Version:
+
Previous Engine Version: <Previous engine version>
+
Engine Type: <Engine type>, either antimalware engine or Network Inspection System engine.
+
User: <Domain>\<User>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
+

+
+

User action:

+
+

The Windows Defender client update failed. This event occurs when the client fails to update itself. This event is usually due to an interruption in network connectivity during an update.

+

To troubleshoot this event: +

    +
  1. Update the definitions. Either:
      +
    1. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows Defender

      Or,

      +
    2. +
    3. Download the latest definitions from the Microsoft Malware Protection Center. + +

      Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

      +
    4. +
    +
  2. +
  3. Contact Microsoft Technical Support. +
  4. +
+

+
Event ID: 2004 +

Symbolic name:

+
+

MALWAREPROTECTION_SIGNATURE_REVERSION

+
+

Message:

+
+

There was a problem loading antimalware definitions. The antimalware engine will attempt to load the last-known good set of definitions.

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to load signatures and will attempt reverting back to a known-good set of signatures.

+
+
Signatures Attempted:
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware engine version>
+
+

+
+

User action:

+
+

The Windows Defender client attempted to download and install the latest definitions file and failed. This error can occur when the client encounters an error while trying to load the definitions, or if the file is corrupt. Windows Defender will attempt to revert back to a known-good set of definitions.

+

To troubleshoot this event: +

    +
  1. Restart the computer and try again.
  2. +
  3. Download the latest definitions from the Microsoft Malware Protection Center. + +

    Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

    +
  4. +
  5. Contact Microsoft Technical Support. +
  6. +
+

+
Event ID: 2005 +

Symbolic name:

+
+

MALWAREPROTECTION_ENGINE_UPDATE_PLATFORMOUTOFDATE

+
+

Message:

+
+

The antimalware engine failed to load because the antimalware platform is out of date. The antimalware platform will load the last-known good antimalware engine and attempt to update.

+
+

Description:

+
+

+

Windows Defender could not load antimalware engine because current platform version is not supported. Windows Defender will revert back to the last known-good engine and a platform update will be attempted.

+
+
Current Platform Version: <Current platform version>
+
+

+
Event ID: 2006 +

Symbolic name:

+
+

MALWAREPROTECTION_PLATFORM_UPDATE_FAILED +

+
+

Message:

+
+

The platform update failed. +

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to update the platform.

+
+
Current Platform Version: <Current platform version>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
+

+
Event ID: 2007 +

Symbolic name:

+
+

MALWAREPROTECTION_PLATFORM_ALMOSTOUTOFDATE

+
+

Message:

+
+

The platform will soon be out of date. Download the latest platform to maintain up-to-date protection.

+
+

Description:

+
+

+

Windows Defender will soon require a newer platform version to support future versions of the antimalware engine. Download the latest Windows Defender platform to maintain the best level of protection available.

+
+
Current Platform Version: <Current platform version>
+
+

+
Event ID: 2010 +

Symbolic name:

+
+

MALWAREPROTECTION_SIGNATURE_FASTPATH_UPDATED +

+
+

Message:

+
+

The antimalware engine used the Dynamic Signature Service to get additional definitions. +

+
+

Description:

+
+

+

Windows Defender used Dynamic Signature Service to retrieve additional signatures to help protect your machine.

+
+
Current Signature Version: <Current signature version>
+
Signature Type: <Signature type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
  • Network Inspection System
  • +
+
+
Current Engine Version: <Current engine version>
+
Dynamic Signature Type: <Dynamic signature type>, for example: +
    +
  • Version
  • +
  • Timestamp
  • +
  • No limit
  • +
  • Duration
  • +
+
+
Persistence Path: <Path>
+
Dynamic Signature Version: <Version number>
+
Dynamic Signature Compilation Timestamp: <Timestamp>
+
Persistence Limit Type: <Persistence limit type>, for example: +
    +
  • VDM version
  • +
  • Timestamp
  • +
  • No limit
  • +
+
+
Persistence Limit: Persistence limit of the fastpath signature.
+
+

+
Event ID: 2011 +

Symbolic name:

+
+

MALWAREPROTECTION_SIGNATURE_FASTPATH_DELETED +

+
+

Message:

+
+

The Dynamic Signature Service deleted the out-of-date dynamic definitions. +

+
+

Description:

+
+

+

Windows Defender used Dynamic Signature Service to discard obsolete signatures.

+
+
Current Signature Version: <Current signature version>
+
Signature Type: <Signature type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
  • Network Inspection System
  • +
+
+
Current Engine Version: <Current engine version>
+
Dynamic Signature Type: <Dynamic signature type>, for example: +
    +
  • Version
  • +
  • Timestamp
  • +
  • No limit
  • +
  • Duration
  • +
+
+
Persistence Path: <Path>
+
Dynamic Signature Version: <Version number>
+
Dynamic Signature Compilation Timestamp: <Timestamp>
+
Removal Reason:
+
Persistence Limit Type: <Persistence limit type>, for example: +
    +
  • VDM version
  • +
  • Timestamp
  • +
  • No limit
  • +
+
+
Persistence Limit: Persistence limit of the fastpath signature.
+
+

+
+

User action:

+
+

No action is necessary. The Windows Defender client is in a healthy state. This event is reported when the Dynamic Signature Service successfully deletes out-of-date dynamic definitions.

+
Event ID: 2012 +

Symbolic name:

+
+

MALWAREPROTECTION_SIGNATURE_FASTPATH_UPDATE_FAILED +

+
+

Message:

+
+

The antimalware engine encountered an error when trying to use the Dynamic Signature Service. +

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to use Dynamic Signature Service.

+
+
Current Signature Version: <Current signature version>
+
Signature Type: <Signature type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
  • Network Inspection System
  • +
+
+
Current Engine Version: <Current engine version>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Dynamic Signature Type: <Dynamic signature type>, for example: +
    +
  • Version
  • +
  • Timestamp
  • +
  • No limit
  • +
  • Duration
  • +
+
+
Persistence Path: <Path>
+
Dynamic Signature Version: <Version number>
+
Dynamic Signature Compilation Timestamp: <Timestamp>
+
Persistence Limit Type: <Persistence limit type>, for example: +
    +
  • VDM version
  • +
  • Timestamp
  • +
  • No limit
  • +
+
+
Persistence Limit: Persistence limit of the fastpath signature.
+
+

+
+

User action:

+
+

Check your Internet connectivity settings.

+
Event ID: 2013 +

Symbolic name:

+
+

MALWAREPROTECTION_SIGNATURE_FASTPATH_DELETED_ALL +

+
+

Message:

+
+

The Dynamic Signature Service deleted all dynamic definitions. +

+
+

Description:

+
+

+

Windows Defender discarded all Dynamic Signature Service signatures.

+
+
Current Signature Version: <Current signature version>
+
+

+
Event ID: 2020 +

Symbolic name:

+
+

MALWAREPROTECTION_CLOUD_CLEAN_RESTORE_FILE_DOWNLOADED +

+
+

Message:

+
+

The antimalware engine downloaded a clean file. +

+
+

Description:

+
+

+

Windows Defender downloaded a clean file.

+
+
Filename: <File name> +Name of the file.
+
Current Signature Version: <Current signature version>
+
Current Engine Version: <Current engine version>
+
+

+
Event ID: 2021 +

Symbolic name:

+
+

MALWAREPROTECTION_CLOUD_CLEAN_RESTORE_FILE_DOWNLOAD_FAILED

+
+

Message:

+
+

The antimalware engine failed to download a clean file. +

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to download a clean file.

+
+
Filename: <File name> +Name of the file.
+
Current Signature Version: <Current signature version>
+
Current Engine Version: <Current engine version>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
+

+
+

User action:

+
+

Check your Internet connectivity settings. +

+

The Windows Defender client encountered an error when using the Dynamic Signature Service to download the latest definitions to a specific threat. This error is likely caused by a network connectivity issue. +

+
Event ID: 2030 +

Symbolic name:

+
+

MALWAREPROTECTION_OFFLINE_SCAN_INSTALLED

+
+

Message:

+
+

The antimalware engine was downloaded and is configured to run offline on the next system restart.

+
+

Description:

+
+

Windows Defender downloaded and configured Windows Defender Offline to run on the next reboot.

+
Event ID: 2031 +

Symbolic name:

+
+

MALWAREPROTECTION_OFFLINE_SCAN_INSTALL_FAILED +

+
+

Message:

+
+

The antimalware engine was unable to download and configure an offline scan.

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to download and configure Windows Defender Offline.

+
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
+

+
Event ID: 2040 +

Symbolic name:

+
+

MALWAREPROTECTION_OS_EXPIRING +

+
+

Message:

+
+

Antimalware support for this operating system version will soon end. +

+
+

Description:

+
+

The support for your operating system will expire shortly. Running Windows Defender on an out of support operating system is not an adequate solution to protect against threats.

+
Event ID: 2041 +

Symbolic name:

+
+

MALWAREPROTECTION_OS_EOL +

+
+

Message:

+
+

Antimalware support for this operating system has ended. You must upgrade the operating system for continued support. +

+
+

Description:

+
+

The support for your operating system has expired. Running Windows Defender on an out of support operating system is not an adequate solution to protect against threats.

+
Event ID: 2042 +

Symbolic name:

+
+

MALWAREPROTECTION_PROTECTION_EOL +

+
+

Message:

+
+

The antimalware engine no longer supports this operating system, and is no longer protecting your system from malware. +

+
+

Description:

+
+

The support for your operating system has expired. Windows Defender is no longer supported on your operating system, has stopped functioning, and is not protecting against malware threats.

+
Event ID: 3002 +

Symbolic name:

+
+

MALWAREPROTECTION_RTP_FEATURE_FAILURE +

+
+

Message:

+
+

Real-time protection encountered an error and failed.

+
+

Description:

+
+

+

Windows Defender Real-Time Protection feature has encountered an error and failed.

+
+
Feature: <Feature>, for example: +
    +
  • On Access
  • +
  • Internet Explorer downloads and Microsoft Outlook Express attachments
  • +
  • Behavior monitoring
  • +
  • Network Inspection System
  • +
+
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Reason: The reason Windows Defender real-time protection has restarted a feature.
+
+

+
+

User action:

+
+

You should restart the system then run a full scan because it’s possible the system was not protected for some time. +

+

The Windows Defender client’s real-time protection feature encountered an error because one of the services failed to start. +

+

If it is followed by a 3007 event ID, the failure was temporary and the antimalware client recovered from the failure. +

+
Event ID: 3007 +

Symbolic name:

+
+

MALWAREPROTECTION_RTP_FEATURE_RECOVERED

+
+

Message:

+
+

Real-time protection recovered from a failure. We recommend running a full system scan when you see this error. +

+
+

Description:

+
+

+

Windows Defender Real-time Protection has restarted a feature. It is recommended that you run a full system scan to detect any items that may have been missed while this agent was down.

+
+
Feature: <Feature>, for example: +
    +
  • On Access
  • +
  • IE downloads and Outlook Express attachments
  • +
  • Behavior monitoring
  • +
  • Network Inspection System
  • +
+
+
Reason: The reason Windows Defender real-time protection has restarted a feature.
+
+

+
+

User action:

+
+

The real-time protection feature has restarted. If this event happens again, contact Microsoft Technical Support.

+
Event ID: 5000 +

Symbolic name:

+
+

MALWAREPROTECTION_RTP_ENABLED +

+
+

Message:

+
+

Real-time protection is enabled. +

+
+

Description:

+
+

Windows Defender Real-time Protection scanning for malware and other potentially unwanted software was enabled.

+
Event ID: 5001 +

Symbolic name:

+
+

MALWAREPROTECTION_RTP_DISABLED

+
+

Message:

+
+

Real-time protection is disabled. +

+
+

Description:

+
+

Windows Defender Real-time Protection scanning for malware and other potentially unwanted software was disabled.

+
Event ID: 5004 +

Symbolic name:

+
+

MALWAREPROTECTION_RTP_FEATURE_CONFIGURED +

+
+

Message:

+
+

The real-time protection configuration changed. +

+
+

Description:

+
+

+

Windows Defender Real-time Protection feature configuration has changed.

+
+
Feature: <Feature>, for example: +
    +
  • On Access
  • +
  • IE downloads and Outlook Express attachments
  • +
  • Behavior monitoring
  • +
  • Network Inspection System
  • +
+
+
Configuration:
+
+

+
Event ID: 5007 +

Symbolic name:

+
+

MALWAREPROTECTION_CONFIG_CHANGED +

+
+

Message:

+
+

The antimalware platform configuration changed.

+
+

Description:

+
+

+

Windows Defender Configuration has changed. If this is an unexpected event you should review the settings as this may be the result of malware.

+
+
Old value: <Old value number> +Old Windows Defender configuration value.
+
New value: <New value number> +New Windows Defender configuration value.
+
+

+
Event ID: 5008 +

Symbolic name:

+
+

MALWAREPROTECTION_ENGINE_FAILURE

+
+

Message:

+
+

The antimalware engine encountered an error and failed.

+
+

Description:

+
+

+

Windows Defender engine has been terminated due to an unexpected error.

+
+
Failure Type: <Failure type>, for example: +Crash +or Hang
+
Exception Code: <Error code>
+
Resource: <Resource>
+
+

+
+

User action:

+
+

To troubleshoot this event:

    +
  1. Try to restart the service.
      +
    • For antimalware, antivirus and spyware, at an elevated command prompt, type net stop msmpsvc, and then type net start msmpsvc to restart the antimalware engine.
    • +
    • For the Network Inspection System, at an elevated command prompt, type net start nissrv, and then type net start nissrv to restart the Network Inspection System engine by using the NiSSRV.exe file. + + + +
    • +
    +
  2. +
  3. If it fails in the same way, look up the error code by accessing the Microsoft Support Site and entering the error number in the Search box, and contact Microsoft Technical Support.
  4. +
+

+
+

User action:

+
+

The Windows Defender client engine stopped due to an unexpected error.

+

To troubleshoot this event: +

    +
  1. Run the scan again.
  2. +
  3. If it fails in the same way, go to the Microsoft Support site, enter the error number in the Search box to look for the error code.
  4. +
  5. Contact Microsoft Technical Support. +
  6. +
+

+
Event ID: 5009 +

Symbolic name:

+
+

MALWAREPROTECTION_ANTISPYWARE_ENABLED +

+
+

Message:

+
+

Scanning for malware and other potentially unwanted software is enabled. +

+
+

Description:

+
+

Windows Defender scanning for malware and other potentially unwanted software has been enabled.

+
Event ID: 5010 +

Symbolic name:

+
+

MALWAREPROTECTION_ANTISPYWARE_DISABLED +

+
+

Message:

+
+

Scanning for malware and other potentially unwanted software is disabled.

+
+

Description:

+
+

Windows Defender scanning for malware and other potentially unwanted software is disabled.

+
Event ID: 5011 +

Symbolic name:

+
+

MALWAREPROTECTION_ANTIVIRUS_ENABLED

+
+

Message:

+
+

Scanning for viruses is enabled.

+
+

Description:

+
+

Windows Defender scanning for viruses has been enabled.

+
Event ID: 5012 +

Symbolic name:

+
+

MALWAREPROTECTION_ANTIVIRUS_DISABLED +

+
+

Message:

+
+

Scanning for viruses is disabled. +

+
+

Description:

+
+

Windows Defender scanning for viruses is disabled.

+
Event ID: 5100 +

Symbolic name:

+
+

MALWAREPROTECTION_EXPIRATION_WARNING_STATE +

+
+

Message:

+
+

The antimalware platform will expire soon. +

+
+

Description:

+
+

+

Windows Defender has entered a grace period and will soon expire. After expiration, this program will disable protection against viruses, spyware, and other potentially unwanted software.

+
+
Expiration Reason: The reason Windows Defender will expire.
+
Expiration Date: The date Windows Defender will expire.
+
+

+
Event ID: 5101 +

Symbolic name:

+
+

MALWAREPROTECTION_DISABLED_EXPIRED_STATE +

+
+

Message:

+
+

The antimalware platform is expired. +

+
+

Description::

+
+

+

Windows Defender grace period has expired. Protection against viruses, spyware, and other potentially unwanted software is disabled.

+
+
Expiration Reason:
+
Expiration Date:
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
+

+
+

 

+

Windows Defender client error codes

+

If Windows Defender experiences any issues it will usually give you an error code to help you troubleshoot the issue. + +Most often an error means there was a problem installing an update. +

+

This section provides the following information about Windows Defender client errors.

+

+

Use the information in these tables to help troubleshoot Windows Defender error codes.

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
External error codes
Error codeMessage displayedPossible reason for errorWhat to do now
+

0x80508007 +

+
+

ERR_MP_NO_MEMORY +

+
+

This error indicates that you might have run out of memory. +

+
+

+

    +
  1. Check the available memory on your device.
  2. +
  3. Close any unused applications that are running to free up memory on your device.
  4. +
  5. Restart the device and run the scan again. +
  6. +
+

+
+

0x8050800C

+
+

ERR_MP_BAD_INPUT_DATA

+
+

This error indicates that there might be a problem with your security product.

+
+

+

    +
  1. Update the definitions. Either:
      +
    1. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows Defender

      Or,

      +
    2. +
    3. Download the latest definitions from the Microsoft Malware Protection Center. + +

      Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

      +
    4. +
    +
  2. +
  3. Run a full scan. +
  4. +
  5. Restart the device and try again.
  6. +
+

+
+

0x80508020

+
+

ERR_MP_BAD_CONFIGURATION +

+
+

This error indicates that there might be an engine configuration error; commonly, this is related to input +data that does not allow the engine to function properly. +

+
+

0x805080211 +

+
+

ERR_MP_QUARANTINE_FAILED +

+
+

This error indicates that Windows Defender failed to quarantine a threat. +

+
+

0x80508022 +

+
+

ERR_MP_REBOOT_REQUIRED +

+
+

This error indicates that a reboot is required to complete threat removal. +

+
+

0x80508023 +

+
+

ERR_MP_THREAT_NOT_FOUND +

+
+

This error indicates that the threat might no longer be present on the media, or malware might be stopping you from scanning your device. +

+
+

Run the Microsoft Safety Scanner then update your security software and try again. +

+
+

ERR_MP_FULL_SCAN_REQUIRED +

+
+

This error indicates that a full system scan might be required. +

+
+

Run a full system scan. +

+
+

0x80508024 +

+
+

0x80508025 +

+
+

ERR_MP_MANUAL_STEPS_REQUIRED +

+
+

This error indicates that manual steps are required to complete threat removal. +

+
+

Follow the manual remediation steps outlined in the Microsoft Malware Protection Encyclopedia. You can find a threat-specific link in the event history. +

+
+

0x80508026 +

+
+

ERR_MP_REMOVE_NOT_SUPPORTED +

+
+

This error indicates that removal inside the container type might not be not supported. +

+
+

Windows Defender is not able to remediate threats detected inside the archive. Consider manually removing the detected resources. +

+
+

0x80508027 +

+
+

ERR_MP_REMOVE_LOW_MEDIUM_DISABLED +

+
+

This error indicates that removal of low and medium threats might be disabled. +

+
+

Check the detected threats and resolve them as required. +

+
+

0x80508029 +

+
+

ERROR_MP_RESCAN_REQUIRED +

+
+

This error indicates a rescan of the threat is required. +

+
+

Run a full system scan. +

+
+

0x80508030 +

+
+

ERROR_MP_CALLISTO_REQUIRED +

+
+

This error indicates that an offline scan is required. +

+
+

Run Windows Defender Offline. You can read about how to do this in the Windows Defender Offline +article.

+
+

0x80508031 +

+
+

ERROR_MP_PLATFORM_OUTDATED +

+
+

This error indicates that Windows Defender does not support the current version of the platform and requires a new version of the platform. +

+
+

You can only use Windows Defender in Windows 10. For Windows 8, Windows 7 and Windows Vista, you can use System Center Endpoint Protection. +

+
+

 

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Internal error codes
Error codeMessage displayedPossible reason for errorWhat to do now
+

0x80501004

+
+

ERROR_MP_NO_INTERNET_CONN +

+
+

Check your Internet connection, then run the scan again.

+
+

Check your Internet connection, then run the scan again.

+
+

0x80501000

+
+

ERROR_MP_UI_CONSOLIDATION_BASE

+
+

This is an internal error. The cause is not clearly defined.

+
+

+

    +
  1. Update the definitions. Either:
      +
    1. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows Defender

      Or,

      +
    2. +
    3. Download the latest definitions from the Microsoft Malware Protection Center. + +

      Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

      +
    4. +
    +
  2. +
  3. Run a full scan. +
  4. +
  5. Restart the device and try again.
  6. +
+

+
+

0x80501001

+
+

ERROR_MP_ACTIONS_FAILED

+
+

0x80501002

+
+

ERROR_MP_NOENGINE

+
+

0x80501003

+
+

ERROR_MP_ACTIVE_THREATS

+
+

0x805011011

+
+

MP_ERROR_CODE_LUA_CANCELLED

+
+

0x80501101

+
+

ERROR_LUA_CANCELLATION

+
+

0x80501102

+
+

MP_ERROR_CODE_ALREADY_SHUTDOWN

+
+

0x80501103

+
+

MP_ERROR_CODE_RDEVICE_S_ASYNC_CALL_PENDING

+
+

0x80501104

+
+

MP_ERROR_CODE_CANCELLED

+
+

0x80501105

+
+

MP_ERROR_CODE_NO_TARGETOS

+
+

0x80501106

+
+

MP_ERROR_CODE_BAD_REGEXP

+
+

0x80501107

+
+

MP_ERROR_TEST_INDUCED_ERROR

+
+

0x80501108

+
+

MP_ERROR_SIG_BACKUP_DISABLED

+
+

0x80508001

+
+

ERR_MP_BAD_INIT_MODULES

+
+

0x80508002

+
+

ERR_MP_BAD_DATABASE

+
+

0x80508004

+
+

ERR_MP_BAD_UFS

+
+

0x8050800C

+
+

ERR_MP_BAD_INPUT_DATA

+
+

0x8050800D

+
+

ERR_MP_BAD_GLOBAL_STORAGE

+
+

0x8050800E

+
+

ERR_MP_OBSOLETE

+
+

0x8050800F

+
+

ERR_MP_NOT_SUPPORTED

+
+

0x8050800F +0x80508010 +

+
+

ERR_MP_NO_MORE_ITEMS

+
+

0x80508011

+
+

ERR_MP_DUPLICATE_SCANID

+
+

0x80508012

+
+

ERR_MP_BAD_SCANID

+
+

0x80508013

+
+

ERR_MP_BAD_USERDB_VERSION

+
+

0x80508014

+
+

ERR_MP_RESTORE_FAILED

+
+

0x80508016

+
+

ERR_MP_BAD_ACTION

+
+

0x80508019

+
+

ERR_MP_NOT_FOUND

+
+

0x80509001

+
+

ERR_RELO_BAD_EHANDLE

+
+

0x80509003

+
+

ERR_RELO_KERNEL_NOT_LOADED

+
+

0x8050A001

+
+

ERR_MP_BADDB_OPEN

+
+

0x8050A002

+
+

ERR_MP_BADDB_HEADER

+
+

0x8050A003

+
+

ERR_MP_BADDB_OLDENGINE

+
+

0x8050A004

+
+

ERR_MP_BADDB_CONTENT

+
+

0x8050A005

+
+

ERR_MP_BADDB_NOTSIGNED

+
+

0x8050801

+
+

ERR_MP_REMOVE_FAILED

+
+

This is an internal error. It might be triggered when malware removal is not successful. +

+
+

0x80508018 +

+
+

ERR_MP_SCAN_ABORTED +

+
+

This is an internal error. It might have triggered when a scan fails to complete. +

+
  + +## Related topics + + +[Configure Windows Defender in Windows 10](configure-windows-defender-for-windows-10.md) + +[Update and manage Windows Defender in Windows 10](get-started-with-windows-defender-for-windows-10.md) + +  + +  + + + + + diff --git a/windows/keep-secure/vpn-profile-options.md b/windows/keep-secure/vpn-profile-options.md index 3c11ea96cd..c45af8b993 100644 --- a/windows/keep-secure/vpn-profile-options.md +++ b/windows/keep-secure/vpn-profile-options.md @@ -27,7 +27,7 @@ Always On is a new feature in Windows 10 which enables the active VPN profile to - Network change -When a device has multiple profiles with Always On triggers, the user can specify the active profile in **Settings** > **Network & Internet** > **VPN** > VPN profile > **Let apps automatically use this VPN connection**. +When a device has multiple profiles with Always On triggers, the user can specify the active profile in **Settings** > **Network & Internet** > **VPN** > *VPN profile* > **Let apps automatically use this VPN connection**. ## App-triggered VPN diff --git a/windows/keep-secure/windows-defender-in-windows-10.md b/windows/keep-secure/windows-defender-in-windows-10.md index a7341189e6..9106a10a85 100644 --- a/windows/keep-secure/windows-defender-in-windows-10.md +++ b/windows/keep-secure/windows-defender-in-windows-10.md @@ -76,7 +76,7 @@ For more information about what's new in Windows Defender in Windows 10, see [W @@ -84,7 +84,7 @@ For more information about what's new in Windows Defender in Windows 10, see [W

IT professionals can configure definition updates and cloud-based protection in Windows Defender in Windows 10 through Active Directory and WSUS.

-

[Troubleshoot Windows Defender in Windows 10](troubleshoot-windows-defender-for-windows-10.md)

+

[Troubleshoot Windows Defender in Windows 10](troubleshoot-windows-defender-in-windows-10.md)

IT professionals can review information about event IDs in Windows Defender for Windows 10 and see any relevant action they can take.

diff --git a/windows/manage/app-inventory-managemement-for-windows-store-for-business.md b/windows/manage/app-inventory-managemement-for-windows-store-for-business.md index 8332ba51fb..3a3d6be3c3 100644 --- a/windows/manage/app-inventory-managemement-for-windows-store-for-business.md +++ b/windows/manage/app-inventory-managemement-for-windows-store-for-business.md @@ -194,7 +194,7 @@ You can download offline-licensed apps from your inventory. You'll need to downl For more information about online and offline licenses, see [Apps in the Windows Store for Business](apps-in-the-windows-store-for-business.md#licensing-model). -For more information about downloading offline-licensed apps, see [Download offline apps](../manage/download-offline-licensed-app.md). +For more information about downloading offline-licensed apps, see [Download offline apps](distribute-offline-apps.md).   diff --git a/windows/manage/configure-mdm-provider.md b/windows/manage/configure-mdm-provider.md index 33917f1a5a..47260870e4 100644 --- a/windows/manage/configure-mdm-provider.md +++ b/windows/manage/configure-mdm-provider.md @@ -44,6 +44,8 @@ After your management tool is added to your Azure AD directory, you can configur Your MDM tool is ready to use with Store for Business. Consult docs for your management tool to learn how to distribute apps from your synchronized inventory. +See [Manage apps you purchased from Windows Store for Business with Microsoft InTune](https://technet.microsoft.com/library/mt676514.aspx) to learn how to configure synchroniztion and deploy apps. +     diff --git a/windows/manage/distribute-apps-with-a-management-tool.md b/windows/manage/distribute-apps-with-a-management-tool.md index 8483992273..ef0c17aa09 100644 --- a/windows/manage/distribute-apps-with-a-management-tool.md +++ b/windows/manage/distribute-apps-with-a-management-tool.md @@ -56,6 +56,13 @@ This diagram shows how you can use a management tool to distribute an online-lic ![](images/wsfb-online-distribute-mdm.png) +## Related topics + + +[Configure MDM Provider](../manage/configure-mdm-provider.md) + +[Manage apps you purchased from the Windows Store for Business with Micosoft InTune](https://technet.microsoft.com/library/mt676514.aspx) +     diff --git a/windows/manage/index.md b/windows/manage/index.md index 36df08a4b0..63beb79e14 100644 --- a/windows/manage/index.md +++ b/windows/manage/index.md @@ -43,7 +43,7 @@ Learn about managing and updating Windows 10.

[Manage corporate devices](manage-corporate-devices.md)

-

You can use the same management tools to manage all device types running Windows 10 : desktops, laptops, tablets, and phones. And your current management tools, such as Group Policy, Windows Management Instrumentation (WMI), Windows PowerShell scripts, Orchestrator runbooks, System Center tools, and so on, will continue to work for Windows 10 on desktop editions.

+

You can use the same management tools to manage all device types running Windows 10 : desktops, laptops, tablets, and phones. And your current management tools, such as Group Policy, Windows Management Instrumentation (WMI), PowerShell scripts, Orchestrator runbooks, System Center tools, and so on, will continue to work for Windows 10 on desktop editions.

[Manage Windows 10 Start layout options](windows-10-start-layout-options-and-policies.md)

diff --git a/windows/manage/join-windows-10-mobile-to-azure-active-directory.md b/windows/manage/join-windows-10-mobile-to-azure-active-directory.md index 0002b2917d..e0cde52fa6 100644 --- a/windows/manage/join-windows-10-mobile-to-azure-active-directory.md +++ b/windows/manage/join-windows-10-mobile-to-azure-active-directory.md @@ -77,7 +77,7 @@ An added work account provides the same SSO experience in browser apps like Offi - **Mobile device management** - An MDM service is required for managing Azure AD-joined devices. You can use MDM to push settings to devices, as well as application and certificates used by VPN, Wi-Fi, etc. Azure AD Premium or Enterprise Mobility Services (EMS) licenses are required to set up your Azure AD-joined devices to automatically enroll in MDM. [Learn more about setting up your Azure AD tenant for MDM auto-enrollment.](http://go.microsoft.com/fwlink/p/?LinkID=691615) + An MDM service is required for managing Azure AD-joined devices. You can use MDM to push settings to devices, as well as application and certificates used by VPN, Wi-Fi, etc. Azure AD Premium or Enterprise Mobility Suite (EMS) licenses are required to set up your Azure AD-joined devices to automatically enroll in MDM. [Learn more about setting up your Azure AD tenant for MDM auto-enrollment.](http://go.microsoft.com/fwlink/p/?LinkID=691615) - **Microsoft Passport** diff --git a/windows/manage/manage-corporate-devices.md b/windows/manage/manage-corporate-devices.md index af0555339b..dca8bf4608 100644 --- a/windows/manage/manage-corporate-devices.md +++ b/windows/manage/manage-corporate-devices.md @@ -17,7 +17,7 @@ author: jdeckerMS - Windows 10 - Windows 10 Mobile -You can use the same management tools to manage all device types running Windows 10 : desktops, laptops, tablets, and phones. And your current management tools, such as Group Policy, Windows Management Instrumentation (WMI), Windows PowerShell scripts, Orchestrator runbooks, System Center tools, and so on, will continue to work for Windows 10 on desktop editions. +You can use the same management tools to manage all device types running Windows 10 : desktops, laptops, tablets, and phones. And your current management tools, such as Group Policy, Windows Management Instrumentation (WMI), PowerShell scripts, Orchestrator runbooks, System Center tools, and so on, will continue to work for Windows 10 on desktop editions. There are several options for managing Windows 10 on corporate-owned devices in an enterprise. diff --git a/windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md b/windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md index 79d871504a..3171136e43 100644 --- a/windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md +++ b/windows/manage/set-up-a-kiosk-for-windows-10-for-desktop-editions.md @@ -257,7 +257,7 @@ Using Shell Launcher, you can configure a kiosk device that runs a Classic Windo ### Configure Shell Launcher -To set a Classic Windows application as the shell, you first turn on the Shell Launcher feature, and then you can set your custom shell as the default using Windows PowerShell. +To set a Classic Windows application as the shell, you first turn on the Shell Launcher feature, and then you can set your custom shell as the default using PowerShell. **To turn on Shell Launcher in Windows features** diff --git a/windows/manage/windows-10-mobile-and-mdm.md b/windows/manage/windows-10-mobile-and-mdm.md index 205d23e3cd..4bc61cabb5 100644 --- a/windows/manage/windows-10-mobile-and-mdm.md +++ b/windows/manage/windows-10-mobile-and-mdm.md @@ -338,7 +338,7 @@ Table 5. Windows 10 Mobile account management settings It’s common sense to lock a device when it is not in use. Microsoft recommends that you secure Windows 10 Mobile devices and implement a device lock policy. A device password or PIN lock is a best practice for securing apps and data on devices. [Windows Hello](http://go.microsoft.com/fwlink/p/?LinkId=723994) is the name given to the new biometric sign-in option that allows users to use their face, iris, or fingerprints to unlock their compatible device, all of which Windows 10 supports. **Note**   -In addition to the device lock restrictions discussed in this section, Windows 10 supports Microsoft Passport for Work, which lets you access apps and services without a password. Microsoft Passport for Work is supported only in Windows 10 for desktop and requires Configuration Manager. In addition, the device must be joined to a domain. For more information, see [Enable Microsoft Passport for work in the organization](http://go.microsoft.com/fwlink/p/?LinkId=723995). +In addition to the device lock restrictions discussed in this section, Windows 10 supports Microsoft Passport for Work, which lets you access apps and services without a password.   diff --git a/windows/plan/index.md b/windows/plan/index.md index 91e29ba596..d947cf3348 100644 --- a/windows/plan/index.md +++ b/windows/plan/index.md @@ -85,7 +85,7 @@ Windows 10 provides new deployment capabilities, scenarios, and tools by buildi [Windows Imaging and Configuration Designer](http://go.microsoft.com/fwlink/p/?LinkId=733911) -[Windows 10 and Windows 10 Mobile](../index.md) +[Windows 10 and Windows 10 Mobile](../p_ent_nodes/windows-10.md)   diff --git a/windows/plan/setup-and-deployment.md b/windows/plan/setup-and-deployment.md index e1b3189738..28d4166bf5 100644 --- a/windows/plan/setup-and-deployment.md +++ b/windows/plan/setup-and-deployment.md @@ -90,6 +90,7 @@ Windows Update for Business allows administrators to control when upgrades and u + Administrators can control deferral periods with Group Policy Objects by using the [Local Group Policy Editor (GPEdit)](http://go.microsoft.com/fwlink/p/?LinkId=734030) or, for domain joined systems, [Group Policy Management Console (GPMC)](http://go.microsoft.com/fwlink/p/?LinkId=699325). For additional details on Group Policy management see [Group Policy management for IT pros](http://go.microsoft.com/fwlink/p/?LinkId=699282). **Set different deferrals based on update classification in GPedit.msc**