mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-16 07:17:24 +00:00
Merge pull request #4509 from MicrosoftDocs/av-4758555
update "Manage Microsoft Defender Antivirus updates and apply baselines"
This commit is contained in:
commit
899227f220
@ -12,7 +12,7 @@ ms.localizationpriority: medium
|
||||
author: denisebmsft
|
||||
ms.author: deniseb
|
||||
ms.custom: nextgen
|
||||
ms.reviewer:
|
||||
ms.reviewer: pahuijbr
|
||||
manager: dansimp
|
||||
---
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Manage how and where Microsoft Defender AV receives updates
|
||||
title: Manage how and where Microsoft Defender Antivirus receives updates
|
||||
description: Manage the fallback order for how Microsoft Defender Antivirus receives protection updates.
|
||||
keywords: updates, security baselines, protection, fallback order, ADL, MMPC, UNC, file path, share, wsus
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
@ -10,7 +10,7 @@ ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: denisebmsft
|
||||
ms.author: deniseb
|
||||
ms.reviewer:
|
||||
ms.reviewer: pahuijbr
|
||||
manager: dansimp
|
||||
ms.custom: nextgen
|
||||
---
|
||||
@ -170,7 +170,7 @@ Set up a network file share (UNC/mapped drive) to download security intelligence
|
||||
MD C:\Temp\TempSigs\x86
|
||||
```
|
||||
|
||||
3. Download the Powershell script from [www.powershellgallery.com/packages/SignatureDownloadCustomTask/1.4](https://www.powershellgallery.com/packages/SignatureDownloadCustomTask/1.4).
|
||||
3. Download the PowerShell script from [www.powershellgallery.com/packages/SignatureDownloadCustomTask/1.4](https://www.powershellgallery.com/packages/SignatureDownloadCustomTask/1.4).
|
||||
|
||||
4. Click **Manual Download**.
|
||||
|
||||
|
@ -11,9 +11,9 @@ ms.localizationpriority: medium
|
||||
author: denisebmsft
|
||||
ms.author: deniseb
|
||||
ms.custom: nextgen
|
||||
ms.reviewer:
|
||||
ms.reviewer: pahuijbr
|
||||
manager: dansimp
|
||||
ms.date: 12/05/2020
|
||||
ms.date: 01/06/2021
|
||||
---
|
||||
|
||||
# Manage Microsoft Defender Antivirus updates and apply baselines
|
||||
@ -47,7 +47,7 @@ Microsoft Defender Antivirus uses [cloud-delivered protection](utilize-microsoft
|
||||
|
||||
Cloud-delivered protection is always on and requires an active connection to the Internet to function. Security intelligence updates occur on a scheduled cadence (configurable via policy). For more information, see [Use Microsoft cloud-provided protection in Microsoft Defender Antivirus](utilize-microsoft-cloud-protection-microsoft-defender-antivirus.md).
|
||||
|
||||
For a list of recent security intelligence updates, please visit: [Antimalware updates change log - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/definitions/antimalware-definition-release-notes).
|
||||
For a list of recent security intelligence updates, see [Antimalware updates change log - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/definitions/antimalware-definition-release-notes).
|
||||
|
||||
Engine updates are included with security intelligence updates and are released on a monthly cadence.
|
||||
|
||||
@ -68,13 +68,13 @@ For more information, see [Manage the sources for Microsoft Defender Antivirus p
|
||||
|
||||
## Monthly platform and engine versions
|
||||
|
||||
For information how to update or how to install the platform update, see [Update for Windows Defender antimalware platform](https://support.microsoft.com/help/4052623/update-for-windows-defender-antimalware-platform).
|
||||
For information how to update or install the platform update, see [Update for Windows Defender antimalware platform](https://support.microsoft.com/help/4052623/update-for-windows-defender-antimalware-platform).
|
||||
|
||||
All our updates contain
|
||||
- performance improvements;
|
||||
- serviceability improvements; and
|
||||
- integration improvements (Cloud, Microsoft 365 Defender).
|
||||
<br/>
|
||||
<br/><br/>
|
||||
|
||||
|
||||
<details>
|
||||
@ -87,6 +87,7 @@ All our updates contain
|
||||
 Support phase: **Security and Critical Updates**
|
||||
|
||||
### What's new
|
||||
|
||||
- Improved SmartScreen status support logging
|
||||
- Apply CPU throttling policy to manually initiated scans
|
||||
|
||||
@ -103,12 +104,14 @@ No known issues
|
||||
 Support phase: **Security and Critical Updates**
|
||||
|
||||
### What's new
|
||||
|
||||
- New descriptions for special threat categories
|
||||
- Improved emulation capabilities
|
||||
- Improved host address allow/block capabilities
|
||||
- New option in Defender CSP to Ignore merging of local user exclusions
|
||||
|
||||
### Known Issues
|
||||
|
||||
No known issues
|
||||
<br/>
|
||||
</details><details>
|
||||
@ -121,6 +124,7 @@ No known issues
|
||||
 Support phase: **Security and Critical Updates**
|
||||
|
||||
### What's new
|
||||
|
||||
- Admin permissions are required to restore files in quarantine
|
||||
- XML formatted events are now supported
|
||||
- CSP support for ignoring exclusion merges
|
||||
@ -132,9 +136,16 @@ No known issues
|
||||
- Improved Office VBA module scanning
|
||||
|
||||
### Known Issues
|
||||
|
||||
No known issues
|
||||
<br/>
|
||||
</details>
|
||||
|
||||
### Previous version updates: Technical upgrade support only
|
||||
|
||||
Previous version updates are listed below, and are provided for technical upgrade support only.
|
||||
<br/><br/>
|
||||
|
||||
<details>
|
||||
<summary> August-2020 (Platform: 4.18.2008.9 | Engine: 1.1.17400.5)</summary>
|
||||
|
||||
@ -142,7 +153,6 @@ No known issues
|
||||
 Released: **August 27, 2020**
|
||||
 Platform: **4.18.2008.9**
|
||||
 Engine: **1.1.17400.5**
|
||||
 Support phase: **Security and Critical Updates**
|
||||
|
||||
### What's new
|
||||
|
||||
@ -166,11 +176,12 @@ No known issues
|
||||
 Released: **July 28, 2020**
|
||||
 Platform: **4.18.2007.8**
|
||||
 Engine: **1.1.17300.4**
|
||||
 Support phase: **Security and Critical Updates**
|
||||
 Support phase: **Technical upgrade support (only)**
|
||||
|
||||
### What's new
|
||||
* Improved telemetry for BITS
|
||||
* Improved Authenticode code signing certificate validation
|
||||
|
||||
- Improved telemetry for BITS
|
||||
- Improved Authenticode code signing certificate validation
|
||||
|
||||
### Known Issues
|
||||
No known issues
|
||||
@ -184,15 +195,16 @@ No known issues
|
||||
 Released: **June 22, 2020**
|
||||
 Platform: **4.18.2006.10**
|
||||
 Engine: **1.1.17200.2**
|
||||
 Support phase: **Technical upgrade Support (Only)**
|
||||
 Support phase: **Technical upgrade support (only)**
|
||||
|
||||
### What's new
|
||||
* Possibility to specify the [location of the support logs](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data)
|
||||
* Skipping aggressive catchup scan in Passive mode.
|
||||
* Allow Defender to update on metered connections
|
||||
* Fixed performance tuning when caching is disabled
|
||||
* Fixed registry query
|
||||
* Fixed scantime randomization in ADMX
|
||||
|
||||
- Possibility to specify the [location of the support logs](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data)
|
||||
- Skipping aggressive catchup scan in Passive mode.
|
||||
- Allow Defender to update on metered connections
|
||||
- Fixed performance tuning when caching is disabled
|
||||
- Fixed registry query
|
||||
- Fixed scantime randomization in ADMX
|
||||
|
||||
### Known Issues
|
||||
No known issues
|
||||
@ -206,15 +218,16 @@ No known issues
|
||||
 Released: **May 26, 2020**
|
||||
 Platform: **4.18.2005.4**
|
||||
 Engine: **1.1.17100.2**
|
||||
 Support phase: **Technical upgrade Support (Only)**
|
||||
 Support phase: **Technical upgrade support (only)**
|
||||
|
||||
### What's new
|
||||
* Improved logging for scan events
|
||||
* Improved user mode crash handling.
|
||||
* Added event tracing for Tamper protection
|
||||
* Fixed AMSI Sample submission
|
||||
* Fixed AMSI Cloud blocking
|
||||
* Fixed Security update install log
|
||||
|
||||
- Improved logging for scan events
|
||||
- Improved user mode crash handling.
|
||||
- Added event tracing for Tamper protection
|
||||
- Fixed AMSI Sample submission
|
||||
- Fixed AMSI Cloud blocking
|
||||
- Fixed Security update install log
|
||||
|
||||
### Known Issues
|
||||
No known issues
|
||||
@ -228,16 +241,16 @@ No known issues
|
||||
 Released: **April 30, 2020**
|
||||
 Platform: **4.18.2004.6**
|
||||
 Engine: **1.1.17000.2**
|
||||
 Support phase: **Technical upgrade Support (Only)**
|
||||
 Support phase: **Technical upgrade support (only)**
|
||||
|
||||
### What's new
|
||||
* WDfilter improvements
|
||||
* Add more actionable event data to attack surface reduction detection events
|
||||
* Fixed version information in diagnostic data and WMI
|
||||
* Fixed incorrect platform version in UI after platform update
|
||||
* Dynamic URL intel for Fileless threat protection
|
||||
* UEFI scan capability
|
||||
* Extend logging for updates
|
||||
- WDfilter improvements
|
||||
- Add more actionable event data to attack surface reduction detection events
|
||||
- Fixed version information in diagnostic data and WMI
|
||||
- Fixed incorrect platform version in UI after platform update
|
||||
- Dynamic URL intel for Fileless threat protection
|
||||
- UEFI scan capability
|
||||
- Extend logging for updates
|
||||
|
||||
### Known Issues
|
||||
No known issues
|
||||
@ -251,15 +264,15 @@ No known issues
|
||||
 Released: **March 24, 2020**
|
||||
 Platform: **4.18.2003.8**
|
||||
 Engine: **1.1.16900.4**
|
||||
 Support phase: **Technical upgrade Support (Only)**
|
||||
 Support phase: **Technical upgrade support (only)**
|
||||
|
||||
### What's new
|
||||
|
||||
* CPU Throttling option added to [MpCmdRun](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus)
|
||||
* Improve diagnostic capability
|
||||
* reduce Security intelligence timeout (5 min)
|
||||
* Extend AMSI engine internal log capability
|
||||
* Improve notification for process blocking
|
||||
- CPU Throttling option added to [MpCmdRun](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus)
|
||||
- Improve diagnostic capability
|
||||
- reduce Security intelligence timeout (5 min)
|
||||
- Extend AMSI engine internal log capability
|
||||
- Improve notification for process blocking
|
||||
|
||||
### Known Issues
|
||||
[**Fixed**] Microsoft Defender Antivirus is skipping files when running a scan.
|
||||
@ -272,11 +285,11 @@ No known issues
|
||||
<summary> February-2020 (Platform: - | Engine: 1.1.16800.2)</summary>
|
||||
|
||||
|
||||
Security intelligence update version: **1.311.4.0**
|
||||
Released: **February 25, 2020**
|
||||
Platform/Client: **-**
|
||||
Engine: **1.1.16800.2**
|
||||
Support phase: **N/A**
|
||||
 Security intelligence update version: **1.311.4.0**
|
||||
 Released: **February 25, 2020**
|
||||
 Platform/Client: **-**
|
||||
 Engine: **1.1.16800.2**
|
||||
 Support phase: **Technical upgrade support (only)**
|
||||
|
||||
### What's new
|
||||
|
||||
@ -294,24 +307,26 @@ Security intelligence update version: **1.309.32.0**
|
||||
Released: **January 30, 2020**
|
||||
Platform/Client: **4.18.2001.10**
|
||||
Engine: **1.1.16700.2**
|
||||
Support phase: **Technical upgrade Support (Only)**
|
||||
 Support phase: **Technical upgrade support (only)**
|
||||
|
||||
### What's new
|
||||
|
||||
* Fixed BSOD on WS2016 with Exchange
|
||||
* Support platform updates when TMP is redirected to network path
|
||||
* Platform and engine versions are added to [WDSI](https://www.microsoft.com/wdsi/defenderupdates)
|
||||
* extend Emergency signature update to [passive mode](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility)
|
||||
* Fix 4.18.1911.3 hang
|
||||
- Fixed BSOD on WS2016 with Exchange
|
||||
- Support platform updates when TMP is redirected to network path
|
||||
- Platform and engine versions are added to [WDSI](https://www.microsoft.com/wdsi/defenderupdates)
|
||||
- extend Emergency signature update to [passive mode](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility)
|
||||
- Fix 4.18.1911.3 hang
|
||||
|
||||
### Known Issues
|
||||
[**Fixed**] devices utilizing [modern standby mode](https://docs.microsoft.com/windows-hardware/design/device-experiences/modern-standby) may experience a hang with the Windows Defender filter driver that results in a gap of protection. Affected machines appear to the customer as having not updated to the latest antimalware platform.
|
||||
<br/>
|
||||
> [!IMPORTANT]
|
||||
> This updates is needed by RS1 devices running lower version of the platform to support SHA2. <br/>This update has reboot flag for systems that are experiencing the hang issue.<br/> the This update is re-released in April 2020 and will not be superseded by newer updates to keep future availability.
|
||||
<br/>
|
||||
> [!IMPORTANT]
|
||||
> This update is categorized as an "update" due to its reboot requirement and will only be offered with a [Windows Update](https://support.microsoft.com/help/4027667/windows-10-update)
|
||||
> This update is:
|
||||
> - needed by RS1 devices running lower version of the platform to support SHA2;
|
||||
> - has a reboot flag for systems that have hanging issues;
|
||||
> - is re-released in April 2020 and will not be superseded by newer updates to keep future availability;
|
||||
> - is categorized as an update due to the reboot requirement; and
|
||||
> - is only be offered with [Windows Update](https://support.microsoft.com/help/4027667/windows-10-update).
|
||||
<br/>
|
||||
</details>
|
||||
|
||||
@ -326,24 +341,24 @@ Support phase: **No support**
|
||||
|
||||
### What's new
|
||||
|
||||
* Fixed MpCmdRun tracing level
|
||||
* Fixed WDFilter version info
|
||||
* Improve notifications (PUA)
|
||||
* add MRT logs to support files
|
||||
- Fixed MpCmdRun tracing level
|
||||
- Fixed WDFilter version info
|
||||
- Improve notifications (PUA)
|
||||
- add MRT logs to support files
|
||||
|
||||
### Known Issues
|
||||
When this update is installed, the device needs the jump package 4.10.2001.10 to be able to update to the latest platform version.
|
||||
<br/>
|
||||
</details>
|
||||
|
||||
|
||||
## Microsoft Defender Antivirus platform support
|
||||
Platform and engine updates are provided on a monthly cadence. To be fully supported, keep current with the latest platform updates. Our support structure is dynamic, evolving into two phases depending on the availability of the latest platform version:
|
||||
|
||||
|
||||
* **Security and Critical Updates servicing phase** - When running the latest platform version, you will be eligible to receive both Security and Critical updates to the anti-malware platform.
|
||||
- **Security and Critical Updates servicing phase** - When running the latest platform version, you will be eligible to receive both Security and Critical updates to the anti-malware platform.
|
||||
|
||||
|
||||
* **Technical Support (Only) phase** - After a new platform version is released, support for older versions (N-2) will reduce to technical support only. Platform versions older than N-2 will no longer be supported.*
|
||||
- **Technical Support (Only) phase** - After a new platform version is released, support for older versions (N-2) will reduce to technical support only. Platform versions older than N-2 will no longer be supported.*
|
||||
|
||||
\* Technical support will continue to be provided for upgrades from the Windows 10 release version (see [Platform version included with Windows 10 releases](#platform-version-included-with-windows-10-releases)) to the latest platform version.
|
||||
|
||||
@ -367,7 +382,9 @@ Windows 10 release info: [Windows lifecycle fact sheet](https://support.microsof
|
||||
|
||||
## Updates for Deployment Image Servicing and Management (DISM)
|
||||
|
||||
We recommend updating your Windows 10 (Enterprise, Pro, and Home editions), Windows Server 2019, and Windows Server 2016 OS installation images with the latest antivirus and antimalware updates. Keeping your OS installation images up to date helps avoid a gap in protection. For more information, see [Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images).
|
||||
We recommend updating your Windows 10 (Enterprise, Pro, and Home editions), Windows Server 2019, and Windows Server 2016 OS installation images with the latest antivirus and antimalware updates. Keeping your OS installation images up to date helps avoid a gap in protection.
|
||||
|
||||
For more information, see [Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images).
|
||||
|
||||
<details>
|
||||
<summary>1.1.2012.01</summary>
|
||||
@ -427,12 +444,12 @@ We recommend updating your Windows 10 (Enterprise, Pro, and Home editions), Wind
|
||||
<br/>
|
||||
</details>
|
||||
|
||||
## See also
|
||||
## Additional resources
|
||||
|
||||
| Article | Description |
|
||||
|:---|:---|
|
||||
|[Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images) | Review antimalware update packages for your OS installation images (WIM and VHD files). Get Microsoft Defender Antivirus updates for Windows 10 (Enterprise, Pro, and Home editions), Windows Server 2019, and Windows Server 2016 installation images. |
|
||||
|[Manage how protection updates are downloaded and applied](manage-protection-updates-microsoft-defender-antivirus.md) | Protection updates can be delivered through a number of sources. |
|
||||
|[Manage how protection updates are downloaded and applied](manage-protection-updates-microsoft-defender-antivirus.md) | Protection updates can be delivered through many sources. |
|
||||
|[Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md) | You can schedule when protection updates should be downloaded. |
|
||||
|[Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md) | If an endpoint misses an update or scheduled scan, you can force an update or scan the next time a user signs in. |
|
||||
|[Manage event-based forced updates](manage-event-based-updates-microsoft-defender-antivirus.md) | You can set protection updates to be downloaded at startup or after certain cloud-delivered protection events. |
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Define how mobile devices are updated by Microsoft Defender AV
|
||||
description: Manage how mobile devices, such as laptops, should be updated with Microsoft Defender AV protection updates.
|
||||
title: Define how mobile devices are updated by Microsoft Defender Antivirus
|
||||
description: Manage how mobile devices, such as laptops, should be updated with Microsoft Defender Antivirus protection updates.
|
||||
keywords: updates, protection, schedule updates, battery, mobile device, laptop, notebook, opt-in, microsoft update, wsus, override
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: w10
|
||||
@ -11,7 +11,6 @@ ms.localizationpriority: medium
|
||||
author: denisebmsft
|
||||
ms.author: deniseb
|
||||
ms.custom: nextgen
|
||||
ms.date: 09/03/2018
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
---
|
||||
@ -25,53 +24,56 @@ manager: dansimp
|
||||
|
||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
||||
|
||||
Mobile devices and VMs may require additional configuration to ensure performance is not impacted by updates.
|
||||
Mobile devices and VMs may require more configuration to ensure performance is not impacted by updates.
|
||||
|
||||
There are two settings that are particularly useful for these devices:
|
||||
There are two settings that are useful for these devices:
|
||||
|
||||
- Opt-in to Microsoft Update on mobile computers without a WSUS connection
|
||||
- Opt in to Microsoft Update on mobile computers without a WSUS connection
|
||||
- Prevent Security intelligence updates when running on battery power
|
||||
|
||||
The following topics may also be useful in these situations:
|
||||
The following articles may also be useful in these situations:
|
||||
- [Configuring scheduled and catch-up scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md)
|
||||
- [Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md)
|
||||
- [Deployment guide for Microsoft Defender Antivirus in a virtual desktop infrastructure (VDI) environment](deployment-vdi-microsoft-defender-antivirus.md)
|
||||
|
||||
## Opt-in to Microsoft Update on mobile computers without a WSUS connection
|
||||
## Opt in to Microsoft Update on mobile computers without a WSUS connection
|
||||
|
||||
You can use Microsoft Update to keep Security intelligence on mobile devices running Microsoft Defender Antivirus up to date when they are not connected to the corporate network or don't otherwise have a WSUS connection.
|
||||
|
||||
This means that protection updates can be delivered to devices (via Microsoft Update) even if you have set WSUS to override Microsoft Update.
|
||||
|
||||
You can opt-in to Microsoft Update on the mobile device in one of the following ways:
|
||||
You can opt in to Microsoft Update on the mobile device in one of the following ways:
|
||||
|
||||
1. Change the setting with Group Policy
|
||||
2. Use a VBScript to create a script, then run it on each computer in your network.
|
||||
3. Manually opt-in every computer on your network through the **Settings** menu.
|
||||
- Change the setting with Group Policy.
|
||||
- Use a VBScript to create a script, then run it on each computer in your network.
|
||||
- Manually opt in every computer on your network through the **Settings** menu.
|
||||
|
||||
### Use Group Policy to opt-in to Microsoft Update
|
||||
### Use Group Policy to opt in to Microsoft Update
|
||||
|
||||
1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
|
||||
1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and select **Edit**.
|
||||
|
||||
3. In the **Group Policy Management Editor** go to **Computer configuration**.
|
||||
2. In the **Group Policy Management Editor** go to **Computer configuration**.
|
||||
|
||||
4. Click **Policies** then **Administrative templates**.
|
||||
3. Select **Policies** then **Administrative templates**.
|
||||
|
||||
5. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Signature Updates**.
|
||||
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Signature Updates**.
|
||||
|
||||
6. Double-click the **Allow security intelligence updates from Microsoft Update** setting and set the option to **Enabled**. Click **OK**.
|
||||
5. Set **Allow security intelligence updates from Microsoft Update** to **Enabled**, and then select **OK**.
|
||||
|
||||
|
||||
### Use a VBScript to opt-in to Microsoft Update
|
||||
### Use a VBScript to opt in to Microsoft Update
|
||||
|
||||
1. Use the instructions in the MSDN article [Opt-In to Microsoft Update](https://msdn.microsoft.com/library/windows/desktop/aa826676.aspx) to create the VBScript.
|
||||
2. Run the VBScript you created on each computer in your network.
|
||||
1. Use the instructions in the MSDN article [Opt-In to Microsoft Update](https://msdn.microsoft.com/library/windows/desktop/aa826676.aspx) to create the VBScript.
|
||||
|
||||
### Manually opt-in to Microsoft Update
|
||||
2. Run the VBScript you created on each computer in your network.
|
||||
|
||||
1. Open **Windows Update** in **Update & security** settings on the computer you want to opt-in.
|
||||
2. Click **Advanced** options.
|
||||
3. Select the checkbox for **Give me updates for other Microsoft products when I update Windows**.
|
||||
### Manually opt in to Microsoft Update
|
||||
|
||||
1. Open **Windows Update** in **Update & security** settings on the computer you want to opt in.
|
||||
|
||||
2. Select **Advanced** options.
|
||||
|
||||
3. Select the checkbox for **Give me updates for other Microsoft products when I update Windows**.
|
||||
|
||||
## Prevent Security intelligence updates when running on battery power
|
||||
|
||||
@ -79,17 +81,15 @@ You can configure Microsoft Defender Antivirus to only download protection updat
|
||||
|
||||
### Use Group Policy to prevent security intelligence updates on battery power
|
||||
|
||||
1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
|
||||
1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), choose the Group Policy Object you want to configure, and open it for editing.
|
||||
|
||||
3. In the **Group Policy Management Editor** go to **Computer configuration**.
|
||||
2. In the **Group Policy Management Editor** go to **Computer configuration**.
|
||||
|
||||
4. Click **Policies** then **Administrative templates**.
|
||||
3. Select **Policies** then **Administrative templates**.
|
||||
|
||||
5. Expand the tree to **Windows components > Microsoft Defender Antivirus > Signature Updates** and configure the following setting:
|
||||
|
||||
1. Double-click the **Allow security intelligence updates when running on battery power** setting and set the option to **Disabled**.
|
||||
2. Click **OK**. This will prevent protection updates from downloading when the PC is on battery power.
|
||||
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Signature Updates**, and then set **Allow security intelligence updates when running on battery power** to **Disabled**. Then select **OK**.
|
||||
|
||||
This action prevents protection updates from downloading when the PC is on battery power.
|
||||
|
||||
## Related articles
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user