mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 05:17:22 +00:00
Merged PR 11750: additional updates for rs5 (from pr 11748)
This commit is contained in:
parent
f01fb6dac8
commit
951a08abdd
@ -8,14 +8,14 @@ ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: andreabichsel
|
||||
ms.author: v-anbic
|
||||
ms.date: 09/11/2018
|
||||
ms.date: 10/02/2018
|
||||
---
|
||||
|
||||
# TPM Group Policy settings
|
||||
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server 2016
|
||||
- Windows Server 2016 and later
|
||||
|
||||
This topic describes the Trusted Platform Module (TPM) Services that can be controlled centrally by using Group Policy settings.
|
||||
|
||||
@ -23,9 +23,7 @@ The Group Policy settings for TPM services are located at:
|
||||
|
||||
**Computer Configuration\\Administrative Templates\\System\\Trusted Platform Module Services\\**
|
||||
|
||||
The following Group Policy settings were introduced in Window 10.
|
||||
|
||||
|
||||
The following Group Policy settings were introduced in Windows 10.
|
||||
|
||||
## Configure the level of TPM owner authorization information available to the operating system
|
||||
|
||||
@ -128,6 +126,17 @@ Introduced in Windows 10, version 1703, this policy setting configures the TPM t
|
||||
> - Disable it from group policy
|
||||
> - Clear the TPM on the system
|
||||
|
||||
# TPM Group Policy settings in the Windows Security app
|
||||
|
||||
You can change what users see about TPM in the Windows Security app. The Group Policy settings for the TPM area in the Windows Security app are located at:
|
||||
|
||||
**Computer Configuration\\Administrative Templates\\Windows Components\\Windows Security\\Device security**
|
||||
|
||||
## Disable the Clear TPM button
|
||||
If you don't want users to be able to click the **Clear TPM** button in the Windows Security app, you can disable it with this Group Policy setting. Select **Enabled** to make the **Clear TPM** button unavailable for use.
|
||||
|
||||
## Hide the TPM Firmware Update recommendation
|
||||
If you don't want users to see the recommendation to update TPM firmware, you can disable it with this setting. Select **Enabled** to prevent users from seeing a recommendation to update their TPM firmware when a vulnerable firmware is detected.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: andreabichsel
|
||||
ms.author: v-anbic
|
||||
ms.date: 09/03/2018
|
||||
ms.date: 10/02/2018
|
||||
|
||||
---
|
||||
|
||||
@ -55,6 +55,7 @@ Scan removable drives during full scans only | Scan > Scan removable drives | Di
|
||||
Specify the level of subfolders within an archive folder to scan | Scan > Specify the maximum depth to scan archive files | 0 | Not available
|
||||
Specify the maximum CPU load (as a percentage) during a scan. Note: This is not a hard limit but rather a guidance for the scanning engine to not exceed this maximum on average. | Scan > Specify the maximum percentage of CPU utilization during a scan | 50 | `-ScanAvgCPULoadFactor`
|
||||
Specify the maximum size (in kilobytes) of archive files that should be scanned. The default, **0**, applies no limit | Scan > Specify the maximum size of archive files to be scanned | No limit | Not available
|
||||
Configure low CPU priority for scheduled scans | Scan > Configure low CPU priority for scheduled scans | Disabled | Not available
|
||||
|
||||
>[!NOTE]
|
||||
>By default, quick scans run on mounted removable devices, such as USB drives.
|
||||
|
@ -96,7 +96,7 @@ For a list of Windows Defender Antivirus device restrictions in Intune, see [Dev
|
||||
|
||||
If you had to change any of the settings, you should re-deploy the Group Policy Object across your network to ensure all endpoints are covered.
|
||||
|
||||
### Confirm block at first sight is enabled with the Windows Defender Security Center app
|
||||
### Confirm block at first sight is enabled with the Windows Security app
|
||||
|
||||
You can confirm that block at first sight is enabled in Windows Settings.
|
||||
|
||||
@ -104,11 +104,11 @@ Block at first sight is automatically enabled as long as **Cloud-based protectio
|
||||
|
||||
**Confirm Block at First Sight is enabled on individual clients**
|
||||
|
||||
1. Open the Windows Defender Security Center app by clicking the shield icon in the task bar.
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar.
|
||||
|
||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then click **Virus & threat protection settings**:
|
||||
|
||||

|
||||

|
||||
|
||||
3. Confirm that **Cloud-based Protection** and **Automatic sample submission** are switched to **On**.
|
||||
|
||||
|
@ -53,9 +53,9 @@ To exclude files opened by a specific process, see [Configure and validate exclu
|
||||
The exclusions apply to [scheduled scans](scheduled-catch-up-scans-windows-defender-antivirus.md), [on-demand scans](run-scan-windows-defender-antivirus.md), and [real-time protection](configure-real-time-protection-windows-defender-antivirus.md).
|
||||
|
||||
>[!IMPORTANT]
|
||||
>Exclusion list changes made with Group Policy **will show** in the lists in the [Windows Defender Security Center app](windows-defender-security-center-antivirus.md#exclusions).
|
||||
>Exclusion list changes made with Group Policy **will show** in the lists in the [Windows Security app](windows-defender-security-center-antivirus.md#exclusions).
|
||||
>
|
||||
>Changes made in the Windows Defender Security Center app **will not show** in the Group Policy lists.
|
||||
>Changes made in the Windows Security app **will not show** in the Group Policy lists.
|
||||
|
||||
By default, local changes made to the lists (by users with administrator privileges, including changes made with PowerShell and WMI) will be merged with the lists as defined (and deployed) by Group Policy, Configuration Manager, or Intune. The Group Policy lists will take precedence in case of conflicts.
|
||||
|
||||
@ -157,9 +157,9 @@ See the following for more information and allowed parameters:
|
||||
|
||||
<a id="man-tools"></a>
|
||||
|
||||
**Use the Windows Defender Security Center app to configure file name, folder, or file extension exclusions:**
|
||||
**Use the Windows Security app to configure file name, folder, or file extension exclusions:**
|
||||
|
||||
See [Add exclusions in the Windows Defender Security Center app](windows-defender-security-center-antivirus.md#exclusions) for instructions.
|
||||
See [Add exclusions in the Windows Security app](windows-defender-security-center-antivirus.md#exclusions) for instructions.
|
||||
|
||||
<a id="wildcards"></a>
|
||||
## Use wildcards in the file name and folder path or extension exclusion lists
|
||||
@ -264,12 +264,12 @@ The following table describes how the wildcards can be used and provides some ex
|
||||
|
||||
## Review the list of exclusions
|
||||
|
||||
You can retrieve the items in the exclusion list with [Intune](https://docs.microsoft.com/en-us/intune/deploy-use/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune), [System Center Configuration Manager](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings), PowerShell, or the [Windows Defender Security Center app](windows-defender-security-center-antivirus.md#exclusions).
|
||||
You can retrieve the items in the exclusion list with [Intune](https://docs.microsoft.com/en-us/intune/deploy-use/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune), [System Center Configuration Manager](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings), PowerShell, or the [Windows Security app](windows-defender-security-center-antivirus.md#exclusions).
|
||||
|
||||
>[!IMPORTANT]
|
||||
>Exclusion list changes made with Group Policy **will show** in the lists in the [Windows Defender Security Center app](windows-defender-security-center-antivirus.md#exclusions).
|
||||
>Exclusion list changes made with Group Policy **will show** in the lists in the [Windows Security app](windows-defender-security-center-antivirus.md#exclusions).
|
||||
>
|
||||
>Changes made in the Windows Defender Security Center app **will not show** in the Group Policy lists.
|
||||
>Changes made in the Windows Security app **will not show** in the Group Policy lists.
|
||||
|
||||
If you use PowerShell, you can retrieve the list in two ways:
|
||||
|
||||
|
@ -28,7 +28,7 @@ For example, it may be necessary to allow certain user groups (such as security
|
||||
|
||||
The default setting for these policies is **Disabled**.
|
||||
|
||||
If they are set to **Enabled**, users on endpoints can make changes to the associated setting with the [Windows Defender Security Center](windows-defender-security-center-antivirus.md) app, local Group Policy settings, and PowerShell cmdlets (where appropriate).
|
||||
If they are set to **Enabled**, users on endpoints can make changes to the associated setting with the [Windows Security](windows-defender-security-center-antivirus.md) app, local Group Policy settings, and PowerShell cmdlets (where appropriate).
|
||||
|
||||
The following table lists each of the override policy setting and the configuration instructions for the associated feature or setting.
|
||||
|
||||
@ -66,7 +66,7 @@ Scan | Configure local setting override for the scan type to use for a scheduled
|
||||
|
||||
You can also configure how locally defined lists are combined or merged with globally defined lists. This setting applies to [exclusion lists](configure-exclusions-windows-defender-antivirus.md) and [specified remediation lists](configure-remediation-windows-defender-antivirus.md).
|
||||
|
||||
By default, lists that have been configured in local group policy and the Windows Defender Security Center app are merged with lists that are defined by the appropriate Group Policy Object that you have deployed on your network. Where there are conflicts, the globally-defined list takes precedence.
|
||||
By default, lists that have been configured in local group policy and the Windows Security app are merged with lists that are defined by the appropriate Group Policy Object that you have deployed on your network. Where there are conflicts, the globally-defined list takes precedence.
|
||||
|
||||
You can disable this setting to ensure that only globally-defined lists (such as those from any deployed GPOs) are used.
|
||||
|
||||
|
@ -40,7 +40,7 @@ The Windows Defender Antivirus cloud service provides fast, strong protection fo
|
||||
>[!NOTE]
|
||||
>The Windows Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud, rather it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional signature updates.
|
||||
|
||||
See [Enable cloud-delivered protection](enable-cloud-protection-windows-defender-antivirus.md) for details on enabling the service with Intune, System Center Configuration Manager, Group Policy, PowerShell cmdlets, or on individual clients in the Windows Defender Security Center app.
|
||||
See [Enable cloud-delivered protection](enable-cloud-protection-windows-defender-antivirus.md) for details on enabling the service with Intune, System Center Configuration Manager, Group Policy, PowerShell cmdlets, or on individual clients in the Windows Security app.
|
||||
|
||||
After you've enabled the service, you may need to configure your network or firewall to allow connections between it and your endpoints.
|
||||
|
||||
@ -176,20 +176,20 @@ A similar message occurs if you are using Internet Explorer:
|
||||
|
||||

|
||||
|
||||
You will also see a detection under **Quarantined threats** in the **Scan history** section in the Windows Defender Security Center app:
|
||||
You will also see a detection under **Quarantined threats** in the **Scan history** section in the Windows Security app:
|
||||
|
||||
1. Open the Windows Defender Security Center app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then the **Scan history** label:
|
||||
|
||||

|
||||

|
||||
|
||||
3. Under the **Quarantined threats** section, click the **See full history** label to see the detected fake malware:
|
||||
|
||||

|
||||

|
||||
|
||||
>[!NOTE]
|
||||
>Versions of Windows 10 before version 1703 have a different user interface. See [Windows Defender Antivirus in the Windows Defender Security Center](windows-defender-security-center-antivirus.md) for more information about the differences between versions, and instructions on how to perform common tasks in the different interfaces.
|
||||
>Versions of Windows 10 before version 1703 have a different user interface. See [Windows Defender Antivirus in the Windows Security app](windows-defender-security-center-antivirus.md) for more information about the differences between versions, and instructions on how to perform common tasks in the different interfaces.
|
||||
|
||||
The Windows event log will also show [Windows Defender client event ID 2050](troubleshoot-windows-defender-antivirus.md).
|
||||
|
||||
|
@ -28,7 +28,7 @@ You can also configure how standard notifications appear on endpoints, such as n
|
||||
|
||||
## Configure the additional notifications that appear on endpoints
|
||||
|
||||
You can configure the display of additional notifications, such as recent threat detection summaries, in the [Windows Defender Security Center app](windows-defender-security-center-antivirus.md) and with Group Policy.
|
||||
You can configure the display of additional notifications, such as recent threat detection summaries, in the [Windows Security app](windows-defender-security-center-antivirus.md) and with Group Policy.
|
||||
|
||||
> [!NOTE]
|
||||
> In Windows 10, version 1607 the feature was called **Enhanced notifications** and could be configured under **Windows Settings** > **Update & security** > **Windows Defender**. In Group Policy settings in all versions of Windows 10, it is called **Enhanced notifications**.
|
||||
@ -36,13 +36,13 @@ You can configure the display of additional notifications, such as recent threat
|
||||
> [!IMPORTANT]
|
||||
> Disabling additional notifications will not disable critical notifications, such as threat detection and remediation alerts.
|
||||
|
||||
**Use the Windows Defender Security Center app to disable additional notifications:**
|
||||
**Use the Windows Security app to disable additional notifications:**
|
||||
|
||||
1. Open the Windows Defender Security Center by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then the **Virus & threat protection settings** label:
|
||||
|
||||

|
||||

|
||||
|
||||
3. Scroll to the **Notifications** section and click **Change notification settings**.
|
||||
|
||||
@ -73,7 +73,7 @@ Hiding notifications can be useful in situations where you can't hide the entire
|
||||
> [!NOTE]
|
||||
> Hiding notifications will only occur on endpoints to which the policy has been deployed. Notifications related to actions that must be taken (such as a reboot) will still appear on the [System Center Configuration Manager Endpoint Protection monitoring dashboard and reports](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/monitor-endpoint-protection).
|
||||
|
||||
See [Customize the Windows Defender Security Center app for your organization](/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md) for instructions to add custom contact information to the notifications that users see on their machines.
|
||||
See [Customize the Windows Security app for your organization](/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md) for instructions to add custom contact information to the notifications that users see on their machines.
|
||||
|
||||
**Use Group Policy to hide notifications:**
|
||||
|
||||
|
@ -36,9 +36,9 @@ When you add a process to the process exclusion list, Windows Defender Antivirus
|
||||
|
||||
The exclusions only apply to [always-on real-time protection and monitoring](configure-real-time-protection-windows-defender-antivirus.md). They don't apply to scheduled or on-demand scans.
|
||||
|
||||
Changes made with Group Policy to the exclusion lists **will show** in the lists in the [Windows Defender Security Center app](windows-defender-security-center-antivirus.md#exclusions). However, changes made in the Windows Defender Security Center app **will not show** in the Group Policy lists.
|
||||
Changes made with Group Policy to the exclusion lists **will show** in the lists in the [Windows Security app](windows-defender-security-center-antivirus.md#exclusions). However, changes made in the Windows Security app **will not show** in the Group Policy lists.
|
||||
|
||||
You can add, remove, and review the lists for exclusions in [Group Policy](#gp), [System Center Configuration Manager, Microsoft Intune, and with the Windows Defender Security Center app](#man-tools), and you can [use wildcards](#wildcards) to further customize the lists.
|
||||
You can add, remove, and review the lists for exclusions in [Group Policy](#gp), [System Center Configuration Manager, Microsoft Intune, and with the Windows Security app](#man-tools), and you can [use wildcards](#wildcards) to further customize the lists.
|
||||
|
||||
You can also [use PowerShell cmdlets and WMI to configure the exclusion lists](#ps), including [reviewing](#review) your lists.
|
||||
|
||||
@ -123,9 +123,9 @@ See the following for more information and allowed parameters:
|
||||
|
||||
<a id="man-tools"></a>
|
||||
|
||||
**Use the Windows Defender Security Center app to exclude files that have been opened by specified processes from scans:**
|
||||
**Use the Windows Security app to exclude files that have been opened by specified processes from scans:**
|
||||
|
||||
See [Add exclusions in the Windows Defender Security Center app](windows-defender-security-center-antivirus.md#exclusions) for instructions.
|
||||
See [Add exclusions in the Windows Security app](windows-defender-security-center-antivirus.md#exclusions) for instructions.
|
||||
|
||||
<a id="wildcards"></a>
|
||||
|
||||
@ -147,7 +147,7 @@ Environment variables | The defined variable will be populated as a path when th
|
||||
|
||||
## Review the list of exclusions
|
||||
|
||||
You can retrieve the items in the exclusion list with PowerShell, [System Center Configuration Manager](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings), [Intune](https://docs.microsoft.com/en-us/intune/device-restrictions-configure), or the [Windows Defender Security Center app](windows-defender-security-center-antivirus.md#exclusions).
|
||||
You can retrieve the items in the exclusion list with PowerShell, [System Center Configuration Manager](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings), [Intune](https://docs.microsoft.com/en-us/intune/device-restrictions-configure), or the [Windows Security app](windows-defender-security-center-antivirus.md#exclusions).
|
||||
|
||||
If you use PowerShell, you can retrieve the list in two ways:
|
||||
|
||||
|
@ -22,7 +22,7 @@ ms.date: 09/03/2018
|
||||
|
||||
Windows Defender Antivirus on Windows Server 2016 computers automatically enrolls you in certain exclusions, as defined by your specified server role. See [the end of this topic](#list-of-automatic-exclusions) for a list of these exclusions.
|
||||
|
||||
These exclusions will not appear in the standard exclusion lists shown in the [Windows Defender Security Center app](windows-defender-security-center-antivirus.md#exclusions).
|
||||
These exclusions will not appear in the standard exclusion lists shown in the [Windows Security app](windows-defender-security-center-antivirus.md#exclusions).
|
||||
|
||||
You can still add or remove custom exclusions (in addition to the server role-defined automatic exclusions) as described in these exclusion-related topics:
|
||||
|
||||
|
@ -30,5 +30,5 @@ Topic | Description
|
||||
[Configure Windows Defender Antivirus scanning options](configure-advanced-scan-types-windows-defender-antivirus.md) | You can configure Windows Defender Antivirus to include certain types of email storage files, back-up or reparse points, and archived files (such as .zip files) in scans. You can also enable network file scanning
|
||||
[Configure remediation for scans](configure-remediation-windows-defender-antivirus.md) | Configure what Windows Defender Antivirus should do when it detects a threat, and how long quarantined files should be retained in the quarantine folder
|
||||
[Configure scheduled scans](scheduled-catch-up-scans-windows-defender-antivirus.md) | Set up recurring (scheduled) scans, including when they should run and whether they run as full or quick scans
|
||||
[Configure and run scans](run-scan-windows-defender-antivirus.md) | Run and configure on-demand scans using PowerShell, Windows Management Instrumentation, or individually on endpoints with the Windows Defender Security Center app
|
||||
[Review scan results](review-scan-results-windows-defender-antivirus.md) | Review the results of scans using System Center Configuration Manager, Microsoft Intune, or the Windows Defender Security Center app
|
||||
[Configure and run scans](run-scan-windows-defender-antivirus.md) | Run and configure on-demand scans using PowerShell, Windows Management Instrumentation, or individually on endpoints with the Windows Security app
|
||||
[Review scan results](review-scan-results-windows-defender-antivirus.md) | Review the results of scans using System Center Configuration Manager, Microsoft Intune, or the Windows Security app
|
||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: andreabichsel
|
||||
ms.author: v-anbic
|
||||
ms.date: 09/03/2018
|
||||
ms.date: 10/02/2018
|
||||
---
|
||||
|
||||
# Detect and block potentially unwanted applications
|
||||
@ -49,7 +49,7 @@ The file is placed in the quarantine section so it won't run.
|
||||
|
||||
When a PUA is detected on an endpoint, the endpoint will present a notification to the user ([unless notifications have been disabled](configure-notifications-windows-defender-antivirus.md)) in the same format as normal threat detections (prefaced with "PUA:").
|
||||
|
||||
They will also appear in the usual [quarantine list in the Windows Defender Security Center app](windows-defender-security-center-antivirus.md#detection-history).
|
||||
They will also appear in the usual [quarantine list in the Windows Security app](windows-defender-security-center-antivirus.md#detection-history).
|
||||
|
||||
## View PUA events
|
||||
|
||||
@ -61,17 +61,17 @@ See [Troubleshoot event IDs](troubleshoot-windows-defender-antivirus.md) for det
|
||||
|
||||
## Configure PUA protection
|
||||
|
||||
You can enable PUA protection with Microsoft Intune, System Center Configuration Manager, or PowerShell cmdlets.
|
||||
You can enable PUA protection with Microsoft Intune, System Center Configuration Manager, Group Policy, or PowerShell cmdlets.
|
||||
|
||||
You can also use the PUA audit mode to detect PUA without blocking them. The detections will be captured in the Windows event log.
|
||||
|
||||
This feature is useful if your company is conducting an internal software security compliance check and you'd like to avoid any false positives.
|
||||
|
||||
**Use Intune to configure the PUA protection feature**
|
||||
**Use Intune to configure PUA protection**
|
||||
|
||||
See [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/en-us/intune/device-restrictions-configure) and [Windows Defender Antivirus device restriction settings for Windows 10 in Intune](https://docs.microsoft.com/en-us/intune/device-restrictions-windows-10#windows-defender-antivirus) for more details.
|
||||
|
||||
**Use Configuration Manager to configure the PUA protection feature:**
|
||||
**Use Configuration Manager to configure PUA protection:**
|
||||
|
||||
PUA protection is enabled by default in System Center Configuration Manager (current branch), including version 1606 and later.
|
||||
|
||||
@ -82,7 +82,21 @@ For Configuration Manager 2012, see [How to Deploy Potentially Unwanted Applicat
|
||||
> [!NOTE]
|
||||
> PUA events are reported in the Windows Event Viewer and not in System Center Configuration Manager.
|
||||
|
||||
**Use PowerShell cmdlets to configure the PUA protection feature:**
|
||||
**Use Group Policy to configure PUA protection:**
|
||||
|
||||
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
|
||||
|
||||
2. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
3. Expand the tree to **Windows components > Windows Defender Antivirus**.
|
||||
|
||||
4. Double-click **Configure protection for potentially unwanted applications**.
|
||||
|
||||
5. Click **Enabled** to enable PUA protection.
|
||||
|
||||
6. In **Options**, select **Block** to block potentially unwanted applications, or select **Audit Mode** to test how the setting will work in your environment. Click **OK**.
|
||||
|
||||
**Use PowerShell cmdlets to configure PUA protection:**
|
||||
|
||||
Use the following cmdlet:
|
||||
|
||||
|
@ -23,7 +23,7 @@ ms.date: 09/03/2018
|
||||
>[!NOTE]
|
||||
>The Windows Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud; rather, it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional signature updates.
|
||||
|
||||
You can enable or disable Windows Defender Antivirus cloud-delivered protection with Microsoft Intune, System Center Configuration Manager, Group Policy, PowerShell cmdlets, or on individual clients in the Windows Defender Security Center app.
|
||||
You can enable or disable Windows Defender Antivirus cloud-delivered protection with Microsoft Intune, System Center Configuration Manager, Group Policy, PowerShell cmdlets, or on individual clients in the Windows Security app.
|
||||
|
||||
See [Use Microsoft cloud-delivered protection](utilize-microsoft-cloud-protection-windows-defender-antivirus.md) for an overview of Windows Defender Antivirus cloud-delivered protection.
|
||||
|
||||
@ -104,16 +104,16 @@ SubmitSamplesConsent
|
||||
See the following for more information and allowed parameters:
|
||||
- [Windows Defender WMIv2 APIs](https://msdn.microsoft.com/en-us/library/dn439477(v=vs.85).aspx)
|
||||
|
||||
**Enable cloud-delivered protection on individual clients with the Windows Defender Security Center app**
|
||||
**Enable cloud-delivered protection on individual clients with the Windows Security app**
|
||||
|
||||
> [!NOTE]
|
||||
> If the **Configure local setting override for reporting Microsoft MAPS** Group Policy setting is set to **Disabled**, then the **Cloud-based protection** setting in Windows Settings will be greyed-out and unavailable. Changes made through a Group Policy Object must first be deployed to individual endpoints before the setting will be updated in Windows Settings.
|
||||
|
||||
1. Open the Windows Defender Security Center app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then the **Virus & threat protection settings** label:
|
||||
|
||||

|
||||

|
||||
|
||||
3. Confirm that **Cloud-based Protection** and **Automatic sample submission** are switched to **On**.
|
||||
|
||||
|
@ -34,11 +34,11 @@ By default, Windows Defender Antivirus will enable itself on a Windows 10 device
|
||||
|
||||
If Windows Defender Antivirus is enabled, the usual options will appear to configure it on that device:
|
||||
|
||||

|
||||

|
||||
|
||||
If another antivirus product is installed and working correctly, Windows Defender Antivirus will disable itself. The Windows Defender Security Center app will change the **Virus & threat protection** section to show status about the AV product, and provide a link to the product's configuration options:
|
||||
If another antivirus product is installed and working correctly, Windows Defender Antivirus will disable itself. The Windows Security app will change the **Virus & threat protection** section to show status about the AV product, and provide a link to the product's configuration options:
|
||||
|
||||

|
||||

|
||||
|
||||
Underneath any 3rd party AV products, a new link will appear as **Windows Defender Antivirus options**. Clicking this link will expand to show the toggle that enables limited periodic scanning.
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Hide the Windows Defender Antivirus interface
|
||||
description: You can hide virus and threat protection tile in the Windows Defender Security Center app.
|
||||
description: You can hide virus and threat protection tile in the Windows Security app.
|
||||
keywords: ui lockdown, headless mode, hide app, hide settings, hide interface
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
@ -24,15 +24,15 @@ You can use Group Policy to prevent users on endpoints from seeing the Windows D
|
||||
|
||||
## Hide the Windows Defender Antivirus interface
|
||||
|
||||
In Windows 10, versions 1703, hiding the interface will hide Windows Defender Antivirus notifications and prevent the Virus & threat protection tile from appearing in the Windows Defender Security Center app.
|
||||
In Windows 10, versions 1703, hiding the interface will hide Windows Defender Antivirus notifications and prevent the Virus & threat protection tile from appearing in the Windows Security app.
|
||||
|
||||
With the setting set to **Enabled**:
|
||||
|
||||

|
||||

|
||||
|
||||
With the setting set to **Disabled** or not configured:
|
||||
|
||||

|
||||

|
||||
|
||||
>[!NOTE]
|
||||
>Hiding the interface will also prevent Windows Defender Antivirus notifications from appearing on the endpoint. Windows Defender Advanced Threat Protection notifications will still appear. You can also individually [Configure the notifications that appear on endpoints](configure-notifications-windows-defender-antivirus.md)
|
||||
|
@ -22,7 +22,7 @@ ms.date: 09/03/2018
|
||||
|
||||
If Windows Defender Antivirus is configured to detect and remediate threats on your device, Windows Defender Antivirus quarantines suspicious files. If you are certain these files do not present a threat, you can restore them.
|
||||
|
||||
1. Open **Windows Defender Security Center**.
|
||||
1. Open **Windows Security**.
|
||||
2. Click **Virus & threat protection** and then click **Scan history**.
|
||||
3. Under **Quarantined threats**, click **See full history**.
|
||||
4. Click **Restore** for any items you want to keep. (If you prefer to remove them, you can click **Remove**.)
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Review the results of Windows Defender AV scans
|
||||
description: Review the results of scans using System Center Configuration Manager, Microsoft Intune, or the Windows Defender Security Center app
|
||||
description: Review the results of scans using System Center Configuration Manager, Microsoft Intune, or the Windows Security app
|
||||
keywords: scan results, remediation, full scan, quick scan
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
@ -34,9 +34,9 @@ After an Windows Defender Antivirus scan completes, whether it is an [on-demand]
|
||||
See [How to monitor Endpoint Protection status](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/monitor-endpoint-protection).
|
||||
|
||||
|
||||
**Use the Windows Defender Security Center app to review scan results:**
|
||||
**Use the Windows Security app to review scan results:**
|
||||
|
||||
1. Open the Windows Defender Security Center by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then the **Scan history** label.
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Run and customize on-demand scans in Windows Defender AV
|
||||
description: Run and configure on-demand scans using PowerShell, Windows Management Instrumentation, or individually on endpoints with the Windows Defender Security Center app
|
||||
description: Run and configure on-demand scans using PowerShell, Windows Management Instrumentation, or individually on endpoints with the Windows Security app
|
||||
keywords: scan, on-demand, dos, intune, instant scan
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
@ -61,9 +61,9 @@ See [Use the mpcmdrun.exe commandline tool to configure and manage Windows Defen
|
||||
2. Select **...More** and then select **Quick Scan** or **Full Scan**.
|
||||
|
||||
|
||||
**Use the Windows Defender Security Center app to run a scan:**
|
||||
**Use the Windows Security app to run a scan:**
|
||||
|
||||
See [Run a scan in the Windows Defender Security Center app](windows-defender-security-center-antivirus.md#scan) for instructions on running a scan on individual endpoints.
|
||||
See [Run a scan in the Windows Security app](windows-defender-security-center-antivirus.md#scan) for instructions on running a scan on individual endpoints.
|
||||
|
||||
|
||||
|
||||
|
@ -72,11 +72,11 @@ In passive and automatic disabled mode, you can still [manage updates for Window
|
||||
If you uninstall the other product, and choose to use Windows Defender AV to provide protection to your endpoints, Windows Defender AV will automatically return to its normal active mode.
|
||||
|
||||
>[!WARNING]
|
||||
>You should not attempt to disable, stop, or modify any of the associated services used by Windows Defender AV, Windows Defender ATP, or the Windows Defender Security Center app.
|
||||
>You should not attempt to disable, stop, or modify any of the associated services used by Windows Defender AV, Windows Defender ATP, or the Windows Security app.
|
||||
>
|
||||
>This includes the *wscsvc*, *SecurityHealthService*, *MsSense*, *Sense*, *WinDefend*, or *MsMpEng* services and process. Manually modifying these services can cause severe instability on your endpoints and open your network to infections and attacks.
|
||||
>
|
||||
>It can also cause problems when using third-party antivirus apps and how their information is displayed in the [Windows Defender Security Center app](windows-defender-security-center-antivirus.md).
|
||||
>It can also cause problems when using third-party antivirus apps and how their information is displayed in the [Windows Security app](windows-defender-security-center-antivirus.md).
|
||||
|
||||
|
||||
## Related topics
|
||||
|
@ -43,7 +43,7 @@ You can configure and manage Windows Defender Antivirus with:
|
||||
## What's new in Windows 10, version 1803
|
||||
|
||||
- The [block at first sight feature](configure-block-at-first-sight-windows-defender-antivirus.md) can now block non-portable executable files (such as JS, VBS, or macros) as well as executable files.
|
||||
- The [Virus & threat protection area in the Windows Defender Security Center](windows-defender-security-center-antivirus.md) now includes a section for ransomware protection. It includes controlled folder access settings and ransomware recovery settings.
|
||||
- The [Virus & threat protection area in the Windows Security app](windows-defender-security-center-antivirus.md) now includes a section for ransomware protection. It includes controlled folder access settings and ransomware recovery settings.
|
||||
|
||||
|
||||
## What's new in Windows 10, version 1703
|
||||
@ -51,7 +51,7 @@ You can configure and manage Windows Defender Antivirus with:
|
||||
New features for Windows Defender Antivirus in Windows 10, version 1703 include:
|
||||
- [Updates to how the block at first sight feature can be configured](configure-block-at-first-sight-windows-defender-antivirus.md)
|
||||
- [The ability to specify the level of cloud-protection](specify-cloud-protection-level-windows-defender-antivirus.md)
|
||||
- [Windows Defender Antivirus protection in the Windows Defender Security Center app](windows-defender-security-center-antivirus.md)
|
||||
- [Windows Defender Antivirus protection in the Windows Security app](windows-defender-security-center-antivirus.md)
|
||||
|
||||
We've expanded this documentation library to cover end-to-end deployment, management, and configuration for Windows Defender Antivirus, and we've added some new guides that can help with evaluating and deploying Windows Defender AV in certain scenarios:
|
||||
- [Evaluation guide for Windows Defender Antivirus](evaluate-windows-defender-antivirus.md)
|
||||
@ -69,7 +69,7 @@ Functionality, configuration, and management is largely the same when using Wind
|
||||
|
||||
## Related topics
|
||||
|
||||
[Windows Defender AV in the Windows Defender Security Center app](windows-defender-security-center-antivirus.md)
|
||||
[Windows Defender AV in the Windows Security app](windows-defender-security-center-antivirus.md)
|
||||
[Windows Defender AV on Windows Server 2016](windows-defender-antivirus-on-windows-server-2016.md)
|
||||
[Windows Defender AV compatibility](windows-defender-antivirus-compatibility.md)
|
||||
[Evaluate Windows Defender AV protection](evaluate-windows-defender-antivirus.md)
|
||||
|
@ -44,7 +44,7 @@ This topic includes the following instructions for setting up and running Window
|
||||
By default, Windows Defender AV is installed and functional on Windows Server 2016. The user interface is installed by default on some SKUs, but is not required.
|
||||
|
||||
>[!NOTE]
|
||||
>You can't uninstall the Windows Defender Security Center app, but you can disable the interface with these instructions.
|
||||
>You can't uninstall the Windows Security app, but you can disable the interface with these instructions.
|
||||
|
||||
If the interface is not installed, you can add it in the **Add Roles and Features Wizard** at the **Features** step, under **Windows Defender Features** by selecting the **GUI for Windows Defender** option.
|
||||
|
||||
|
@ -24,7 +24,7 @@ Windows Defender Offline is an antimalware scanning tool that lets you boot and
|
||||
|
||||
You can use Windows Defender Offline if you suspect a malware infection, or you want to confirm a thorough clean of the endpoint after a malware outbreak.
|
||||
|
||||
In Windows 10, Windows Defender Offline can be run with one click directly from the [Windows Defender Security Center app](windows-defender-security-center-antivirus.md). In previous versions of Windows, a user had to install Windows Defender Offline to bootable media, restart the endpoint, and load the bootable media.
|
||||
In Windows 10, Windows Defender Offline can be run with one click directly from the [Windows Security app](windows-defender-security-center-antivirus.md). In previous versions of Windows, a user had to install Windows Defender Offline to bootable media, restart the endpoint, and load the bootable media.
|
||||
|
||||
## Pre-requisites and requirements
|
||||
|
||||
@ -86,7 +86,7 @@ You can run a Windows Defender Offline scan with the following:
|
||||
|
||||
- PowerShell
|
||||
- Windows Management Instrumentation (WMI)
|
||||
- The Windows Defender Security Center app
|
||||
- The Windows Security app
|
||||
|
||||
|
||||
|
||||
@ -116,7 +116,7 @@ See the following for more information:
|
||||
|
||||
**Use the Windows Defender Security app to run an offline scan:**
|
||||
|
||||
1. Open the Windows Defender Security Center by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then the **Advanced scan** label:
|
||||
|
||||
@ -130,7 +130,7 @@ See the following for more information:
|
||||
|
||||
## Review scan results
|
||||
|
||||
Windows Defender Offline scan results will be listed in the [Scan history section of the Windows Defender Security Center app](windows-defender-security-center-antivirus.md#detection-history).
|
||||
Windows Defender Offline scan results will be listed in the [Scan history section of the Windows Security app](windows-defender-security-center-antivirus.md#detection-history).
|
||||
|
||||
|
||||
## Related topics
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Windows Defender Antivirus in the Windows Defender Security Center app
|
||||
description: Windows Defender AV is now included in the Windows Defender Security Center app.
|
||||
title: Windows Defender Antivirus in the Windows Security app
|
||||
description: Windows Defender AV is now included in the Windows Security app.
|
||||
keywords: wdav, antivirus, firewall, security, windows
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
@ -14,13 +14,13 @@ ms.author: v-anbic
|
||||
ms.date: 09/03/2018
|
||||
---
|
||||
|
||||
# Windows Defender Antivirus in the Windows Defender Security Center app
|
||||
# Windows Defender Antivirus in the Windows Security app
|
||||
|
||||
**Applies to:**
|
||||
|
||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||
|
||||
In Windows 10, version 1703 and later, the Windows Defender app is part of the Windows Defender Security Center.
|
||||
In Windows 10, version 1703 and later, the Windows Defender app is part of the Windows Security.
|
||||
|
||||
Settings that were previously part of the Windows Defender client and main Windows Settings have been combined and moved to the new app, which is installed by default as part of Windows 10, version 1703.
|
||||
|
||||
@ -28,27 +28,27 @@ Settings that were previously part of the Windows Defender client and main Windo
|
||||
> Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). These are disabled automatically when a third-party antivirus or firewall product is installed and kept up to date.
|
||||
|
||||
> [!WARNING]
|
||||
> If you do disable the Windows Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Defender Security Center may display stale or inaccurate information about any antivirus or firewall products you have installed on the device.
|
||||
> If you do disable the Windows Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Security app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device.
|
||||
>It may also prevent Windows Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed.
|
||||
>This will significantly lower the protection of your device and could lead to malware infection.
|
||||
|
||||
|
||||
See the [Windows Defender Security Center topic](/windows/threat-protection/windows-defender-security-center/windows-defender-security-center) for more information on other Windows security features that can be monitored in the app.
|
||||
See the [Windows Security topic](/windows/threat-protection/windows-defender-security-center/windows-defender-security-center) for more information on other Windows security features that can be monitored in the app.
|
||||
|
||||
>[!NOTE]
|
||||
>The Windows Defender Security Center app is a client interface on Windows 10, version 1703 and later. It is not the Windows Defender Security Center web portal that is used to review and manage [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md).
|
||||
>The Windows Security app is a client interface on Windows 10, version 1703 and later. It is not the Windows Defender Security Center web portal that is used to review and manage [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md).
|
||||
|
||||
**Review virus and threat protection settings in the Windows Defender Security Center app:**
|
||||
**Review virus and threat protection settings in the Windows Security app:**
|
||||
|
||||
1. Open the Windows Defender Security Center app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar).
|
||||
|
||||

|
||||

|
||||
|
||||
## Comparison of settings and functions of the old app and the new app
|
||||
|
||||
All of the previous functions and settings from the Windows Defender app (in versions of Windows 10 before version 1703) are now found in the new Windows Defender Security Center app. Settings that were previously located in Windows Settings under **Update & security** > **Windows Defender** are also now in the new app.
|
||||
All of the previous functions and settings from the Windows Defender app (in versions of Windows 10 before version 1703) are now found in the new Windows Security app. Settings that were previously located in Windows Settings under **Update & security** > **Windows Defender** are also now in the new app.
|
||||
|
||||
The following diagrams compare the location of settings and functions between the old and new apps:
|
||||
|
||||
@ -67,14 +67,14 @@ Item | Windows 10, before version 1703 | Windows 10, version 1703 and later | De
|
||||
|
||||
## Common tasks
|
||||
|
||||
This section describes how to perform some of the most common tasks when reviewing or interacting with the threat protection provided by Windows Defender Antivirus in the Windows Defender Security Center app.
|
||||
This section describes how to perform some of the most common tasks when reviewing or interacting with the threat protection provided by Windows Defender Antivirus in the Windows Security app.
|
||||
|
||||
> [!NOTE]
|
||||
> If these settings are configured and deployed using Group Policy, the settings described in this section will be greyed-out and unavailable for use on individual endpoints. Changes made through a Group Policy Object must first be deployed to individual endpoints before the setting will be updated in Windows Settings. The [Configure end-user interaction with Windows Defender Antivirus](configure-end-user-interaction-windows-defender-antivirus.md) topic describes how local policy override settings can be configured.
|
||||
|
||||
<a id="scan"></a>
|
||||
**Run a scan with the Windows Defender Security Center app**
|
||||
1. Open the Windows Defender Security Center app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
**Run a scan with the Windows Security app**
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar).
|
||||
|
||||
@ -83,8 +83,8 @@ This section describes how to perform some of the most common tasks when reviewi
|
||||
4. Click **Run a new advanced scan** to specify different types of scans, such as a full scan.
|
||||
|
||||
<a id="definition-version"></a>
|
||||
**Review the definition update version and download the latest updates in the Windows Defender Security Center app**
|
||||
1. Open the Windows Defender Security Center app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
**Review the definition update version and download the latest updates in the Windows Security app**
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar).
|
||||
|
||||
@ -96,9 +96,9 @@ This section describes how to perform some of the most common tasks when reviewi
|
||||
|
||||
|
||||
|
||||
**Ensure Windows Defender Antivirus is enabled in the Windows Defender Security Center app**
|
||||
**Ensure Windows Defender Antivirus is enabled in the Windows Security app**
|
||||
|
||||
1. Open the Windows Defender Security Center app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar).
|
||||
|
||||
@ -108,12 +108,12 @@ This section describes how to perform some of the most common tasks when reviewi
|
||||
|
||||
>[!NOTE]
|
||||
>If you switch **Real-time protection** off, it will automatically turn back on after a short delay. This is to ensure you are protected from malware and threats.
|
||||
>If you install another antivirus product, Windows Defender AV will automatically disable itself and will indicate this in the Windows Defender Security Center app. A setting will appear that will allow you to enable [limited periodic scanning](limited-periodic-scanning-windows-defender-antivirus.md).
|
||||
>If you install another antivirus product, Windows Defender AV will automatically disable itself and will indicate this in the Windows Security app. A setting will appear that will allow you to enable [limited periodic scanning](limited-periodic-scanning-windows-defender-antivirus.md).
|
||||
|
||||
|
||||
<a id="exclusions"></a>
|
||||
**Add exclusions for Windows Defender Antivirus in the Windows Defender Security Center app**
|
||||
1. Open the Windows Defender Security Center app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
**Add exclusions for Windows Defender Antivirus in the Windows Security app**
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar).
|
||||
|
||||
@ -135,7 +135,7 @@ This section describes how to perform some of the most common tasks when reviewi
|
||||
|
||||
<a id="ransomware"></a>
|
||||
**Set ransomware protection and recovery options**
|
||||
1. Open the Windows Defender Security Center app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar).
|
||||
|
||||
|
@ -166,7 +166,7 @@
|
||||
##### [Network firewall](../windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md)
|
||||
#### [Evaluate next generation protection](../windows-defender-antivirus/evaluate-windows-defender-antivirus.md)
|
||||
|
||||
### [Access the Windows Defender Security Center Community Center](community-windows-defender-advanced-threat-protection.md)
|
||||
### [Access the Windows Security app](community-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
## [Configure and manage capabilities](onboard.md)
|
||||
### [Configure attack surface reduction](configure-attack-surface-reduction.md)
|
||||
@ -197,7 +197,7 @@
|
||||
##### [Enable Block at first sight](../windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md)
|
||||
##### [Configure the cloud block timeout period](../windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md)
|
||||
#### [Configure behavioral, heuristic, and real-time protection](../windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md)
|
||||
##### [Detect and block Potentially Unwanted Applications](../windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md)
|
||||
##### [Detect and block potentially unwanted applications](../windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md)
|
||||
##### [Enable and configure always-on protection and monitoring](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md)
|
||||
#### [Antivirus on Windows Server 2016](../windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md)
|
||||
#### [Antivirus compatibility](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md)
|
||||
@ -220,7 +220,7 @@
|
||||
###### [Configure and validate exclusions based on file name, extension, and folder location](../windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md)
|
||||
###### [Configure and validate exclusions for files opened by processes](../windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md)
|
||||
###### [Configure antivirus exclusions Windows Server 2016](../windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md)
|
||||
##### [Configure scanning antivirus options](../windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md)
|
||||
##### [Configure antivirus scanning options](../windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md)
|
||||
##### [Configure remediation for scans](../windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md)
|
||||
##### [Configure scheduled scans](../windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md)
|
||||
##### [Configure and run scans](../windows-defender-antivirus/run-scan-windows-defender-antivirus.md)
|
||||
@ -310,11 +310,11 @@
|
||||
#### [Configure Microsoft Cloud App Security integration](microsoft-cloud-app-security-config.md)
|
||||
|
||||
|
||||
### [Configure Windows Defender Security Center settings](preferences-setup-windows-defender-advanced-threat-protection.md)
|
||||
### [Configure Windows Security app settings](preferences-setup-windows-defender-advanced-threat-protection.md)
|
||||
#### General
|
||||
##### [Update data retention settings](data-retention-settings-windows-defender-advanced-threat-protection.md)
|
||||
##### [Configure alert notifications](configure-email-notifications-windows-defender-advanced-threat-protection.md)
|
||||
##### [Enable and create Power BI reports using Windows Defender Security center data](powerbi-reports-windows-defender-advanced-threat-protection.md)
|
||||
##### [Enable and create Power BI reports using Windows Security app data](powerbi-reports-windows-defender-advanced-threat-protection.md)
|
||||
##### [Enable Secure score security controls](enable-secure-score-windows-defender-advanced-threat-protection.md)
|
||||
##### [Configure advanced features](advanced-features-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
@ -339,7 +339,7 @@
|
||||
##### [Onboarding machines](onboard-configure-windows-defender-advanced-threat-protection.md)
|
||||
##### [Offboarding machines](offboard-machines-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
#### [Configure Windows Defender Security Center time zone settings](time-settings-windows-defender-advanced-threat-protection.md)
|
||||
#### [Configure Windows Security app time zone settings](time-settings-windows-defender-advanced-threat-protection.md)
|
||||
|
||||
|
||||
|
||||
|
@ -11,20 +11,18 @@ ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: andreabichsel
|
||||
ms.author: v-anbic
|
||||
ms.date: 08/08/2018
|
||||
ms.date: 10/02/2018
|
||||
---
|
||||
|
||||
|
||||
|
||||
# Reduce attack surfaces with attack surface reduction rules
|
||||
|
||||
|
||||
**Applies to:**
|
||||
|
||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||
|
||||
Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines.
|
||||
Attack surface reduction rules work best with [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md).
|
||||
|
||||
Attack surface reduction rules work best with [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients.
|
||||
|
||||
Attack surface reduction rules each target specific behaviors that are typically used by malware and malicious apps to infect machines, such as:
|
||||
|
||||
@ -170,13 +168,13 @@ With this rule, admins can prevent unsigned or untrusted executable files from r
|
||||
- Executable files (such as .exe, .dll, or .scr)
|
||||
- Script files (such as a PowerShell .ps, VisualBasic .vbs, or JavaScript .js file)
|
||||
|
||||
### Rule: Block only Office communication applications from creating child processes (available for beta testing)
|
||||
### Rule: Block only Office communication applications from creating child processes
|
||||
|
||||
Office communication apps will not be allowed to create child processes. This includes Outlook.
|
||||
|
||||
This is a typical malware behavior, especially for macro-based attacks that attempt to use Office apps to launch or download malicious executables.
|
||||
|
||||
### Rule: Block Adobe Reader from creating child processes (available for beta testing)
|
||||
### Rule: Block Adobe Reader from creating child processes
|
||||
|
||||
This rule blocks Adobe Reader from creating child processes.
|
||||
|
||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: andreabichsel
|
||||
ms.author: v-anbic
|
||||
ms.date: 08/08/2018
|
||||
ms.date: 10/02/2018
|
||||
---
|
||||
|
||||
# Protect important folders with controlled folder access
|
||||
@ -20,7 +20,7 @@ ms.date: 08/08/2018
|
||||
|
||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||
|
||||
Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware.
|
||||
Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients.
|
||||
Controlled folder access works best with [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md).
|
||||
|
||||
All apps (any executable file, including .exe, .scr, .dll files and others) are assessed by Windows Defender Antivirus, which then determines if the app is malicious or safe. If the app is determined to be malicious or suspicious, then it will not be allowed to make changes to any files in any protected folder.
|
||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: andreabichsel
|
||||
ms.author: v-anbic
|
||||
ms.date: 08/08/2018
|
||||
ms.date: 10/02/2018
|
||||
---
|
||||
|
||||
# Customize attack surface reduction rules
|
||||
@ -20,7 +20,7 @@ ms.date: 08/08/2018
|
||||
|
||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||
|
||||
Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines.
|
||||
Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients.
|
||||
|
||||
This topic describes how to customize attack surface reduction rules by [excluding files and folders](#exclude-files-and-folders) or [adding custom text to the notification](#customize-the-notification) alert that appears on a user's computer.
|
||||
|
||||
@ -96,7 +96,7 @@ Use the [./Vendor/MSFT/Policy/Config/Defender/AttackSurfaceReductionOnlyExclusio
|
||||
|
||||
## Customize the notification
|
||||
|
||||
See the [Windows Defender Security Center](../windows-defender-security-center/windows-defender-security-center.md#customize-notifications-from-the-windows-defender-security-center) topic for more information about customizing the notification when a rule is triggered and blocks an app or file.
|
||||
See the [Windows Security](../windows-defender-security-center/windows-defender-security-center.md#customize-notifications-from-the-windows-defender-security-center) topic for more information about customizing the notification when a rule is triggered and blocks an app or file.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: andreabichsel
|
||||
ms.author: v-anbic
|
||||
ms.date: 08/08/2018
|
||||
ms.date: 10/02/2018
|
||||
---
|
||||
|
||||
# Customize controlled folder access
|
||||
@ -20,9 +20,9 @@ ms.date: 08/08/2018
|
||||
|
||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||
|
||||
Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware.
|
||||
Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients.
|
||||
|
||||
This topic describes how to customize the following settings of the controlled folder access feature with the Windows Defender Security Center app, Group Policy, PowerShell, and mobile device management (MDM) configuration service providers (CSPs):
|
||||
This topic describes how to customize the following settings of the controlled folder access feature with the Windows Security app, Group Policy, PowerShell, and mobile device management (MDM) configuration service providers (CSPs):
|
||||
|
||||
- [Add additional folders to be protected](#protect-additional-folders)
|
||||
- [Add apps that should be allowed to access protected folders](#allow-specifc-apps-to-make-changes-to-controlled-folders)
|
||||
@ -43,11 +43,11 @@ Adding other folders to controlled folder access can be useful, for example, if
|
||||
You can also enter network shares and mapped drives. Environment variables and wildcards are supported. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10).
|
||||
|
||||
|
||||
You can use the Windows Defender Security Center app or Group Policy to add and remove additional protected folders.
|
||||
You can use the Windows Security app or Group Policy to add and remove additional protected folders.
|
||||
|
||||
### Use the Windows Defender Security Center app to protect additional folders
|
||||
### Use the Windows Security app to protect additional folders
|
||||
|
||||
1. Open the Windows Defender Security Center by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then click **Ransomware protection**:
|
||||
|
||||
@ -76,7 +76,7 @@ You can use the Windows Defender Security Center app or Group Policy to add and
|
||||
Add-MpPreference -ControlledFolderAccessProtectedFolders "<the folder to be protected>"
|
||||
```
|
||||
|
||||
Continue to use `Add-MpPreference -ControlledFolderAccessProtectedFolders` to add more folders to the list. Folders added using this cmdlet will appear in the Windows Defender Security Center app.
|
||||
Continue to use `Add-MpPreference -ControlledFolderAccessProtectedFolders` to add more folders to the list. Folders added using this cmdlet will appear in the Windows Security app.
|
||||
|
||||

|
||||
|
||||
@ -92,16 +92,16 @@ Use the [./Vendor/MSFT/Policy/Config/Defender/GuardedFoldersList](https://docs.m
|
||||
You can specify if certain apps should always be considered safe and given write access to files in protected folders. Allowing apps can be useful if you're finding a particular app that you know and trust is being blocked by the controlled folder access feature.
|
||||
|
||||
>[!IMPORTANT]
|
||||
>By default, Windows adds apps that it considers friendly to the allowed list - apps added automatically by Windows are not recorded in the list shown in the Windows Defender Security Center app or by using the associated PowerShell cmdlets.
|
||||
>By default, Windows adds apps that it considers friendly to the allowed list - apps added automatically by Windows are not recorded in the list shown in the Windows Security app or by using the associated PowerShell cmdlets.
|
||||
>You shouldn't need to add most apps. Only add apps if they are being blocked and you can verify their trustworthiness.
|
||||
|
||||
You can use the Windows Defender Security Center app or Group Policy to add and remove apps that should be allowed to access protected folders.
|
||||
You can use the Windows Security app or Group Policy to add and remove apps that should be allowed to access protected folders.
|
||||
|
||||
When you add an app, you have to specify the app's location. Only the app in that location will be permitted access to the protected folders - if the app (with the same name) is located in a different location, then it will not be added to the allow list and may be blocked by controlled folder access.
|
||||
|
||||
### Use the Windows Defender Security app to allow specific apps
|
||||
|
||||
1. Open the Windows Defender Security Center by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
1. Open the Windows Security by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then click **Ransomware protection**.
|
||||
|
||||
@ -135,7 +135,7 @@ When you add an app, you have to specify the app's location. Only the app in tha
|
||||
```PowerShell
|
||||
Add-MpPreference -ControlledFolderAccessAllowedApplications "c:\apps\test.exe"
|
||||
```
|
||||
Continue to use `Add-MpPreference -ControlledFolderAccessAllowedApplications` to add more apps to the list. Apps added using this cmdlet will appear in the Windows Defender Security Center app.
|
||||
Continue to use `Add-MpPreference -ControlledFolderAccessAllowedApplications` to add more apps to the list. Apps added using this cmdlet will appear in the Windows Security app.
|
||||
|
||||

|
||||
|
||||
@ -148,7 +148,7 @@ Use the [./Vendor/MSFT/Policy/Config/Defender/GuardedFoldersAllowedApplications]
|
||||
|
||||
## Customize the notification
|
||||
|
||||
See the [Windows Defender Security Center](../windows-defender-security-center/windows-defender-security-center.md#customize-notifications-from-the-windows-defender-security-center) topic for more information about customizing the notification when a rule is triggered and blocks an app or file.
|
||||
See the [Windows Security](../windows-defender-security-center/windows-defender-security-center.md#customize-notifications-from-the-windows-defender-security-center) topic for more information about customizing the notification when a rule is triggered and blocks an app or file.
|
||||
|
||||
## Related topics
|
||||
- [Protect important folders with controlled folder access](controlled-folders-exploit-guard.md)
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Enable or disable specific mitigations used by Exploit protection
|
||||
keywords: Exploit protection, mitigations, enable, powershell, dep, cfg, emet, aslr
|
||||
description: You can enable individual mitigations using the Windows Defender Security Center app or PowerShell. You can also audit mitigations and export configurations.
|
||||
description: You can enable individual mitigations using the Windows Security app or PowerShell. You can also audit mitigations and export configurations.
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
ms.prod: w10
|
||||
@ -22,11 +22,11 @@ ms.date: 08/08/2018
|
||||
|
||||
Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps.
|
||||
|
||||
You configure these settings using the Windows Defender Security Center on an individual machine, and then export the configuration as an XML file that you can deploy to other machines. You can use Group Policy to distribute the XML file to multiple devices at once. You can also configure the mitigations with PowerShell.
|
||||
You configure these settings using the Windows Security app on an individual machine, and then export the configuration as an XML file that you can deploy to other machines. You can use Group Policy to distribute the XML file to multiple devices at once. You can also configure the mitigations with PowerShell.
|
||||
|
||||
This topic lists each of the mitigations available in exploit protection, indicates whether the mitigation can be applied system-wide or to individual apps, and provides a brief description of how the mitigation works.
|
||||
|
||||
It also describes how to enable or configure the mitigations using Windows Defender Security Center, PowerShell, and MDM CSPs. This is the first step in creating a configuration that you can deploy across your network. The next step involves [generating or exporting, importing, and deploying the configuration to multiple devices](import-export-exploit-protection-emet-xml.md).
|
||||
It also describes how to enable or configure the mitigations using Windows Security, PowerShell, and MDM CSPs. This is the first step in creating a configuration that you can deploy across your network. The next step involves [generating or exporting, importing, and deploying the configuration to multiple devices](import-export-exploit-protection-emet-xml.md).
|
||||
|
||||
>[!WARNING]
|
||||
>Some security mitigation technologies may have compatibility issues with some applications. You should test exploit protection in all target use scenarios by using [audit mode](evaluate-exploit-protection.md) before deploying the configuration across a production environment or the rest of your network.
|
||||
@ -102,9 +102,9 @@ Validate stack integrity (StackPivot) | Ensures that the stack has not been redi
|
||||
>The result will be that DEP will be enabled for *test.exe*. DEP will not be enabled for any other app, including *miles.exe*.
|
||||
>CFG will be enabled for *miles.exe*.
|
||||
|
||||
### Configure system-level mitigations with the Windows Defender Security Center app
|
||||
### Configure system-level mitigations with the Windows Security app
|
||||
|
||||
1. Open the Windows Defender Security Center by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **App & browser control** tile (or the app icon on the left menu bar) and then click **Exploit protection**.
|
||||
|
||||
@ -126,9 +126,9 @@ You can now [export these settings as an XML file](import-export-exploit-protect
|
||||
|
||||
Exporting the configuration as an XML file allows you to copy the configuration from one machine onto other machines.
|
||||
|
||||
### Configure app-specific mitigations with the Windows Defender Security Center app
|
||||
### Configure app-specific mitigations with the Windows Security app
|
||||
|
||||
1. Open the Windows Defender Security Center by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **App & browser control** tile (or the app icon on the left menu bar) and then click **Exploit protection settings** at the bottom of the screen.
|
||||
|
||||
@ -153,9 +153,9 @@ Exporting the configuration as an XML file allows you to copy the configuration
|
||||
|
||||
## PowerShell reference
|
||||
|
||||
You can use the Windows Defender Security Center app to configure Exploit protection, or you can use PowerShell cmdlets.
|
||||
You can use the Windows Security app to configure Exploit protection, or you can use PowerShell cmdlets.
|
||||
|
||||
The configuration settings that were most recently modified will always be applied - regardless of whether you use PowerShell or Windows Defender Security Center. This means that if you use the app to configure a mitigation, then use PowerShell to configure the same mitigation, the app will update to show the changes you made with PowerShell. If you were to then use the app to change the mitigation again, that change would apply.
|
||||
The configuration settings that were most recently modified will always be applied - regardless of whether you use PowerShell or Windows Security. This means that if you use the app to configure a mitigation, then use PowerShell to configure the same mitigation, the app will update to show the changes you made with PowerShell. If you were to then use the app to change the mitigation again, that change would apply.
|
||||
|
||||
>[!IMPORTANT]
|
||||
>Any changes that are deployed to a machine through Group Policy will override the local configuration. When setting up an initial configuration, use a machine that will not have a Group Policy configuration applied to ensure your changes aren't overridden.
|
||||
@ -173,7 +173,7 @@ Get-ProcessMitigation -Name processName.exe
|
||||
>
|
||||
>For app-level settings, `NOTSET` indicates the system-level setting for the mitigation will be applied.
|
||||
>
|
||||
>The default setting for each system-level mitigation can be seen in the Windows Defender Security Center, as described in the [Configure system-level mitigations with the Windows Defender Security Center app section above](#configure-system-level-mitigations-with-the-windows-defender-security-center-app).
|
||||
>The default setting for each system-level mitigation can be seen in the Windows Security, as described in the [Configure system-level mitigations with the Windows Security app section above](#configure-system-level-mitigations-with-the-windows-defender-security-center-app).
|
||||
|
||||
Use `Set` to configure each mitigation in the following format:
|
||||
|
||||
@ -267,7 +267,7 @@ Set-ProcessMitigation -Name processName.exe -Enable EnableExportAddressFilterPlu
|
||||
|
||||
## Customize the notification
|
||||
|
||||
See the [Windows Defender Security Center](../windows-defender-security-center/windows-defender-security-center.md#customize-notifications-from-the-windows-defender-security-center) topic for more information about customizing the notification when a rule is triggered and blocks an app or file.
|
||||
See the [Windows Security](../windows-defender-security-center/windows-defender-security-center.md#customize-notifications-from-the-windows-defender-security-center) topic for more information about customizing the notification when a rule is triggered and blocks an app or file.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
@ -46,15 +46,15 @@ For more information about the individual features and mitigations available in
|
||||
| Windows Defender Exploit Guard | EMET
|
||||
-|:-:|:-:
|
||||
Windows versions | [!include[Check mark yes](images/svg/check-yes.svg)] <br />All versions of Windows 10 starting with version 1709 | [!include[Check mark yes](images/svg/check-yes.svg)] <br />Windows 8.1; Windows 8; Windows 7<br />Cannot be installed on Windows 10, version 1709 and later
|
||||
Installation requirements | [Windows Defender Security Center in Windows 10](../windows-defender-security-center/windows-defender-security-center.md) <br />(no additional installation required)<br />Windows Defender Exploit Guard is built into Windows - it doesn't require a separate tool or package for management, configuration, or deployment. | Available only as an additional download and must be installed onto a management device
|
||||
User interface | Modern interface integrated with the [Windows Defender Security Center](../windows-defender-security-center/windows-defender-security-center.md) | Older, complex interface that requires considerable ramp-up training
|
||||
Installation requirements | [Windows Security in Windows 10](../windows-defender-security-center/windows-defender-security-center.md) <br />(no additional installation required)<br />Windows Defender Exploit Guard is built into Windows - it doesn't require a separate tool or package for management, configuration, or deployment. | Available only as an additional download and must be installed onto a management device
|
||||
User interface | Modern interface integrated with the [Windows Security app](../windows-defender-security-center/windows-defender-security-center.md) | Older, complex interface that requires considerable ramp-up training
|
||||
Supportability | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Dedicated submission-based support channel](https://www.microsoft.com/en-us/wdsi/filesubmission)<sup id="ref1">[[1](#fn1)]</sup><br />[Part of the Windows 10 support lifecycle](https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet) | [!include[Check mark no](images/svg/check-no.svg)]<br />Ends after July 31, 2018
|
||||
Updates | [!include[Check mark yes](images/svg/check-yes.svg)] <br />Ongoing updates and development of new features, released twice yearly as part of the [Windows 10 semi-annual update channel](https://blogs.technet.microsoft.com/windowsitpro/2017/07/27/waas-simplified-and-aligned/) | [!include[Check mark no](images/svg/check-no.svg)]<br />No planned updates or development
|
||||
Exploit protection | [!include[Check mark yes](images/svg/check-yes.svg)] <br />All EMET mitigations plus new, specific mitigations ([see table](#mitigation-comparison))<br />[Can convert and import existing EMET configurations](import-export-exploit-protection-emet-xml.md) | [!include[Check mark yes](images/svg/check-yes.svg)] <br />Limited set of mitigations
|
||||
Attack surface reduction<sup id="ref2-1">[[2](#fn2)]</sup> | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Helps block known infection vectors](attack-surface-reduction-exploit-guard.md)<br />[Can configure individual rules](enable-attack-surface-reduction.md) | [!include[Check mark yes](images/svg/check-yes.svg)] <br />Limited ruleset configuration only for modules (no processes)
|
||||
Network protection<sup id="ref2-2">[[2](#fn2)]</sup> | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Helps block malicious network connections](network-protection-exploit-guard.md) | [!include[Check mark no](images/svg/check-no.svg)]<br />Not available
|
||||
Controlled folder access<sup id="ref2-3">[[2](#fn2)]</sup> | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Helps protect important folders](controlled-folders-exploit-guard.md)<br/>[Configurable for apps and folders](customize-controlled-folders-exploit-guard.md) | [!include[Check mark no](images/svg/check-no.svg)]<br />Not available
|
||||
Configuration with GUI (user interface) | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Use Windows Defender Security Center app to customize and manage configurations](customize-exploit-protection.md) | [!include[Check mark yes](images/svg/check-yes.svg)]<br />Requires installation and use of EMET tool
|
||||
Configuration with GUI (user interface) | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Use Windows Security app to customize and manage configurations](customize-exploit-protection.md) | [!include[Check mark yes](images/svg/check-yes.svg)]<br />Requires installation and use of EMET tool
|
||||
Configuration with Group Policy | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Use Group Policy to deploy and manage configurations](import-export-exploit-protection-emet-xml.md#manage-or-deploy-a-configuration) | [!include[Check mark yes](images/svg/check-yes.svg)]<br />Available
|
||||
Configuration with shell tools | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Use PowerShell to customize and manage configurations](customize-exploit-protection.md#powershell-reference) | [!include[Check mark yes](images/svg/check-yes.svg)]<br />Requires use of EMET tool (EMET_CONF)
|
||||
System Center Configuration Manager | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Use Configuration Manager to customize, deploy, and manage configurations](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/create-deploy-exploit-guard-policy) | [!include[Check mark no](images/svg/check-no.svg)]<br />Not available
|
||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: andreabichsel
|
||||
ms.author: v-anbic
|
||||
ms.date: 08/08/2018
|
||||
ms.date: 10/02/2018
|
||||
---
|
||||
|
||||
# Enable attack surface reduction rules
|
||||
@ -20,7 +20,7 @@ ms.date: 08/08/2018
|
||||
|
||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||
|
||||
Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines.
|
||||
Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients.
|
||||
|
||||
## Enable and audit attack surface reduction rules
|
||||
|
||||
|
@ -11,28 +11,27 @@ ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: andreabichsel
|
||||
ms.author: v-anbic
|
||||
ms.date: 08/08/2018
|
||||
ms.date: 10/02/2018
|
||||
---
|
||||
|
||||
# Enable controlled folder access
|
||||
|
||||
|
||||
**Applies to:**
|
||||
|
||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||
|
||||
Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md).
|
||||
Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md). Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients.
|
||||
|
||||
This topic describes how to enable Controlled folder access with the Windows Defender Security Center app, Group Policy, PowerShell, and mobile device management (MDM) configuration service providers (CSPs).
|
||||
This topic describes how to enable Controlled folder access with the Windows Security app, Group Policy, PowerShell, and mobile device management (MDM) configuration service providers (CSPs).
|
||||
|
||||
## Enable and audit controlled folder access
|
||||
|
||||
You can enable controlled folder access with the Security Center app, Group Policy, PowerShell, or MDM CSPs. You can also set the feature to audit mode. Audit mode allows you to test how the feature would work (and review events) without impacting the normal use of the machine.
|
||||
|
||||
>[!NOTE]
|
||||
>The Controlled folder access feature will display the state in the Windows Defender Security Center app under **Virus & threat protection settings**.
|
||||
>If the feature is configured with Group Policy, PowerShell, or MDM CSPs, the state will change in the Windows Defender Security Center app after a restart of the device.
|
||||
>If the feature is set to **Audit mode** with any of those tools, the Windows Defender Security Center app will show the state as **Off**.
|
||||
>The Controlled folder access feature will display the state in the Windows Security app under **Virus & threat protection settings**.
|
||||
>If the feature is configured with Group Policy, PowerShell, or MDM CSPs, the state will change in the Windows Security app after a restart of the device.
|
||||
>If the feature is set to **Audit mode** with any of those tools, the Windows Security app will show the state as **Off**.
|
||||
>See [Use audit mode to evaluate Windows Defender Exploit Guard features](audit-windows-defender-exploit-guard.md) for more details on how audit mode works.
|
||||
><p>
|
||||
>Group Policy settings that disable local administrator list merging will override controlled folder access settings. They also override protected folders and allowed apps set by the local administrator through controlled folder access. These policies include:
|
||||
@ -42,7 +41,7 @@ You can enable controlled folder access with the Security Center app, Group Poli
|
||||
|
||||
### Use the Windows Defender Security app to enable controlled folder access
|
||||
|
||||
1. Open the Windows Defender Security Center by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then click **Ransomware protection**.
|
||||
|
||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: andreabichsel
|
||||
ms.author: v-anbic
|
||||
ms.date: 08/08/2018
|
||||
ms.date: 10/02/2018
|
||||
---
|
||||
|
||||
# Evaluate attack surface reduction rules
|
||||
@ -20,7 +20,7 @@ ms.date: 08/08/2018
|
||||
|
||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||
|
||||
Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines.
|
||||
Attack surface reduction rules help prevent actions and apps that are typically used by exploit-seeking malware to infect machines. Attack surface reduction rules are supported on Windows Server 2019 as well as Windows 10 clients.
|
||||
|
||||
This topic helps you evaluate attack surface reduction rules. It explains how to demo ASR rules using a specialized tool, and how to enable audit mode so you can test the feature directly in your organization.
|
||||
|
||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: andreabichsel
|
||||
ms.author: v-anbic
|
||||
ms.date: 08/08/2018
|
||||
ms.date: 10/02/2018
|
||||
---
|
||||
|
||||
# Evaluate controlled folder access
|
||||
@ -20,7 +20,7 @@ ms.date: 08/08/2018
|
||||
|
||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||
|
||||
[Controlled folder access](controlled-folders-exploit-guard.md) is a feature that helps protect your documents and files from modification by suspicious or malicious apps.
|
||||
[Controlled folder access](controlled-folders-exploit-guard.md) is a feature that helps protect your documents and files from modification by suspicious or malicious apps. Controlled folder access is supported on Windows Server 2019 as well as Windows 10 clients.
|
||||
|
||||
It is especially useful in helping to protect your documents and information from [ransomware](https://www.microsoft.com/wdsi/threats/ransomware) that can attempt to encrypt your files and hold them hostage.
|
||||
|
||||
|
@ -37,7 +37,7 @@ This topic helps you evaluate exploit protection. For more information about wha
|
||||
|
||||
For this demo you will enable the mitigation that prevents child processes from being created. You'll use Internet Explorer as the parent app.
|
||||
|
||||
First, enable the mitigation using PowerShell, and then confirm that it has been applied in the Windows Defender Security Center app:
|
||||
First, enable the mitigation using PowerShell, and then confirm that it has been applied in the Windows Security app:
|
||||
|
||||
1. Type **powershell** in the Start menu, right click **Windows PowerShell** and click **Run as administrator**
|
||||
|
||||
|
@ -49,7 +49,7 @@ You can also carry out the processes described in this topic in audit or disable
|
||||
|
||||
You will get a 403 Forbidden response in the browser, and you will see a notification that the network connnection was blocked.
|
||||
|
||||

|
||||

|
||||
|
||||
## Review network protection events in Windows Event Viewer
|
||||
|
||||
|
@ -27,7 +27,7 @@ Reviewing the events is also handy when you are evaluating the features, as you
|
||||
|
||||
This topic lists all the events, their associated feature or setting, and describes how to create custom views to filter to specific events.
|
||||
|
||||
You can also get detailed reporting into events and blocks as part of Windows Defender Security Center, which you gain access to if you have an E5 subscription and use [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md).
|
||||
You can also get detailed reporting into events and blocks as part of Windows Security, which you gain access to if you have an E5 subscription and use [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md).
|
||||
|
||||
## Use custom views to review attack surface reduction capabilities
|
||||
|
||||
|
@ -29,7 +29,7 @@ It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md
|
||||
|
||||
Exploit protection works best with [Windows Defender Advanced Threat Protection](../windows-defender-atp/windows-defender-advanced-threat-protection.md) - which gives you detailed reporting into exploit protection events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md).
|
||||
|
||||
You [configure these settings using the Windows Defender Security Center app or PowerShell](customize-exploit-protection.md) on an individual machine, and then [export the configuration as an XML file that you can deploy to other machines](import-export-exploit-protection-emet-xml.md). You can use Group Policy to distribute the XML file to multiple devices at once.
|
||||
You [configure these settings using the Windows Security app or PowerShell](customize-exploit-protection.md) on an individual machine, and then [export the configuration as an XML file that you can deploy to other machines](import-export-exploit-protection-emet-xml.md). You can use Group Policy to distribute the XML file to multiple devices at once.
|
||||
|
||||
When a mitigation is encountered on the machine, a notification will be displayed from the Action Center. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. You can also enable the rules individually to customize what techniques the feature monitors.
|
||||
|
||||
@ -117,15 +117,15 @@ For more information about the individual features and mitigations available in
|
||||
| Windows Defender Exploit Guard | EMET
|
||||
-|:-:|:-:
|
||||
Windows versions | [!include[Check mark yes](images/svg/check-yes.svg)] <br />All versions of Windows 10 starting with version 1709 | [!include[Check mark yes](images/svg/check-yes.svg)] <br />Windows 8.1; Windows 8; Windows 7<br />Cannot be installed on Windows 10, version 1709 and later
|
||||
Installation requirements | [Windows Defender Security Center in Windows 10](../windows-defender-security-center/windows-defender-security-center.md) <br />(no additional installation required)<br />Windows Defender Exploit Guard is built into Windows - it doesn't require a separate tool or package for management, configuration, or deployment. | Available only as an additional download and must be installed onto a management device
|
||||
User interface | Modern interface integrated with the [Windows Defender Security Center](../windows-defender-security-center/windows-defender-security-center.md) | Older, complex interface that requires considerable ramp-up training
|
||||
Installation requirements | [Windows Security in Windows 10](../windows-defender-security-center/windows-defender-security-center.md) <br />(no additional installation required)<br />Windows Defender Exploit Guard is built into Windows - it doesn't require a separate tool or package for management, configuration, or deployment. | Available only as an additional download and must be installed onto a management device
|
||||
User interface | Modern interface integrated with the [Windows Security app](../windows-defender-security-center/windows-defender-security-center.md) | Older, complex interface that requires considerable ramp-up training
|
||||
Supportability | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Dedicated submission-based support channel](https://www.microsoft.com/en-us/wdsi/filesubmission)<sup id="ref1">[[1](#fn1)]</sup><br />[Part of the Windows 10 support lifecycle](https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet) | [!include[Check mark no](images/svg/check-no.svg)]<br />Ends after July 31, 2018
|
||||
Updates | [!include[Check mark yes](images/svg/check-yes.svg)] <br />Ongoing updates and development of new features, released twice yearly as part of the [Windows 10 semi-annual update channel](https://blogs.technet.microsoft.com/windowsitpro/2017/07/27/waas-simplified-and-aligned/) | [!include[Check mark no](images/svg/check-no.svg)]<br />No planned updates or development
|
||||
Exploit protection | [!include[Check mark yes](images/svg/check-yes.svg)] <br />All EMET mitigations plus new, specific mitigations ([see table](#mitigation-comparison))<br />[Can convert and import existing EMET configurations](import-export-exploit-protection-emet-xml.md) | [!include[Check mark yes](images/svg/check-yes.svg)] <br />Limited set of mitigations
|
||||
Attack surface reduction<sup id="ref2-1">[[2](#fn2)]</sup> | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Helps block known infection vectors](attack-surface-reduction-exploit-guard.md)<br />[Can configure individual rules](enable-attack-surface-reduction.md) | [!include[Check mark yes](images/svg/check-yes.svg)] <br />Limited ruleset configuration only for modules (no processes)
|
||||
Network protection<sup id="ref2-2">[[2](#fn2)]</sup> | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Helps block malicious network connections](network-protection-exploit-guard.md) | [!include[Check mark no](images/svg/check-no.svg)]<br />Not available
|
||||
Controlled folder access<sup id="ref2-3">[[2](#fn2)]</sup> | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Helps protect important folders](controlled-folders-exploit-guard.md)<br/>[Configurable for apps and folders](customize-controlled-folders-exploit-guard.md) | [!include[Check mark no](images/svg/check-no.svg)]<br />Not available
|
||||
Configuration with GUI (user interface) | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Use Windows Defender Security Center app to customize and manage configurations](customize-exploit-protection.md) | [!include[Check mark yes](images/svg/check-yes.svg)]<br />Requires installation and use of EMET tool
|
||||
Configuration with GUI (user interface) | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Use Windows Security app to customize and manage configurations](customize-exploit-protection.md) | [!include[Check mark yes](images/svg/check-yes.svg)]<br />Requires installation and use of EMET tool
|
||||
Configuration with Group Policy | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Use Group Policy to deploy and manage configurations](import-export-exploit-protection-emet-xml.md#manage-or-deploy-a-configuration) | [!include[Check mark yes](images/svg/check-yes.svg)]<br />Available
|
||||
Configuration with shell tools | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Use PowerShell to customize and manage configurations](customize-exploit-protection.md#powershell-reference) | [!include[Check mark yes](images/svg/check-yes.svg)]<br />Requires use of EMET tool (EMET_CONF)
|
||||
System Center Configuration Manager | [!include[Check mark yes](images/svg/check-yes.svg)] <br />[Use Configuration Manager to customize, deploy, and manage configurations](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/create-deploy-exploit-guard-policy) | [!include[Check mark no](images/svg/check-no.svg)]<br />Not available
|
||||
|
@ -26,13 +26,13 @@ It is part of [Windows Defender Exploit Guard](windows-defender-exploit-guard.md
|
||||
|
||||
Many of the features that are part of the [Enhanced Mitigation Experience Toolkit (EMET)](https://technet.microsoft.com/en-us/security/jj653751) are now included in exploit protection.
|
||||
|
||||
You use the Windows Defender Security Center or PowerShell to create a set of mitigations (known as a configuration). You can then export this configuration as an XML file and share it with multiple machines on your network so they all have the same set of mitigation settings.
|
||||
You use the Windows Security app or PowerShell to create a set of mitigations (known as a configuration). You can then export this configuration as an XML file and share it with multiple machines on your network so they all have the same set of mitigation settings.
|
||||
|
||||
You can also convert and import an existing EMET configuration XML file into an exploit protection configuration XML.
|
||||
|
||||
This topic describes how to create a configuration file and deploy it across your network, and how to convert an EMET configuration.
|
||||
|
||||
The [Exploit Guard Evaluation Package](https://aka.ms/mp7z2w) contains a sample configuration file (name *ProcessMitigation-Selfhost-v4.xml* that you can use to see how the XML structure looks. The sample file also contains settings that have been converted from an EMET configuration. You can open the file in a text editor (such as Notepad) or import it directly into exploit protection and then review the settings in the Windows Defender Security Center app, as described further in this topic.
|
||||
The [Exploit Guard Evaluation Package](https://aka.ms/mp7z2w) contains a sample configuration file (name *ProcessMitigation-Selfhost-v4.xml* that you can use to see how the XML structure looks. The sample file also contains settings that have been converted from an EMET configuration. You can open the file in a text editor (such as Notepad) or import it directly into exploit protection and then review the settings in the Windows Security app, as described further in this topic.
|
||||
|
||||
## Create and export a configuration file
|
||||
|
||||
@ -40,15 +40,15 @@ Before you export a configuration file, you need to ensure you have the correct
|
||||
|
||||
You should first configure exploit protection on a single, dedicated machine. See [Customize exploit protection](customize-exploit-protection.md) for descriptions about and instructions for configuring mitigations.
|
||||
|
||||
When you have configured exploit protection to your desired state (including both system-level and app-level mitigations), you can export the file using either the Windows Defender Security Center app or PowerShell.
|
||||
When you have configured exploit protection to your desired state (including both system-level and app-level mitigations), you can export the file using either the Windows Security app or PowerShell.
|
||||
|
||||
### Use the Windows Defender Security Center app to export a configuration file
|
||||
### Use the Windows Security app to export a configuration file
|
||||
|
||||
1. Open the Windows Defender Security Center app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||
|
||||
2. Click the **App & browser control** tile (or the app icon on the left menu bar) and then click **Exploit protection settings**:
|
||||
|
||||

|
||||

|
||||
|
||||
3. At the bottom of the **Exploit protection** section, click **Export settings** and then choose the location and name of the XML file where you want the configuration to be saved.
|
||||
|
||||
@ -75,7 +75,7 @@ Change `filename` to any name or location of your choosing.
|
||||
|
||||
You can import an exploit protection configuration file that you've previously created. You can only use PowerShell to import the configuration file.
|
||||
|
||||
After importing, the settings will be instantly applied and can be reviewed in the Windows Defender Security Center app.
|
||||
After importing, the settings will be instantly applied and can be reviewed in the Windows Security app.
|
||||
|
||||
### Use PowerShell to import a configuration file
|
||||
|
||||
|
@ -22,7 +22,7 @@ ms.date: 08/09/2018
|
||||
|
||||
When you create a set of exploit protection mitigations (known as a configuration), you might find that the configuration export and import process does not remove all unwanted mitigations.
|
||||
|
||||
You can manually remove unwanted mitigations in Windows Defender Security Center, or you can use the following process to remove all mitigations and then import a baseline configuration file instead.
|
||||
You can manually remove unwanted mitigations in Windows Security, or you can use the following process to remove all mitigations and then import a baseline configuration file instead.
|
||||
|
||||
1. Remove all process mitigations with this PowerShell script:
|
||||
|
||||
|
@ -43,9 +43,9 @@ You can also [enable audit mode](audit-windows-defender-exploit-guard.md) for th
|
||||
>[!TIP]
|
||||
>You can also visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the features are working and see how each of them work.
|
||||
|
||||
Windows Defender EG can be managed and reported on in the Windows Defender Security Center as part of the Windows Defender Advanced Threat Protection suite of threat mitigation, preventing, protection, and analysis technologies.
|
||||
Windows Defender EG can be managed and reported on in the Windows Security app as part of the Windows Defender Advanced Threat Protection suite of threat mitigation, preventing, protection, and analysis technologies.
|
||||
|
||||
You can use the Windows Defender Security Center to obtain detailed reporting into events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). You can [sign up for a free trial of Windows Defender ATP](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=cx-docs-msa4053440) to see how it works.
|
||||
You can use the Windows Security app to obtain detailed reporting into events and blocks as part of the usual [alert investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md). You can [sign up for a free trial of Windows Defender ATP](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=cx-docs-msa4053440) to see how it works.
|
||||
|
||||
## Requirements
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Account protection in the Windows Defender Security Center app
|
||||
title: Account protection in the Windows Security app
|
||||
description: Use the Account protection section to manage security for your account and sign in to Microsoft.
|
||||
keywords: account protection, wdav, smartscreen, antivirus, wdsc, exploit, protection, hide
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
@ -33,7 +33,7 @@ You can also choose to hide the section from users of the machine. This can be u
|
||||
|
||||
## Hide the Account protection section
|
||||
|
||||
You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Defender Security Center app, and its icon will not be shown on the navigiation bar on the side of the app.
|
||||
You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Security app, and its icon will not be shown on the navigiation bar on the side of the app.
|
||||
|
||||
This can only be done in Group Policy.
|
||||
|
||||
@ -46,7 +46,7 @@ This can only be done in Group Policy.
|
||||
|
||||
3. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
5. Expand the tree to **Windows components > Windows Defender Security Center > Account protection**.
|
||||
5. Expand the tree to **Windows components > Windows Security > Account protection**.
|
||||
|
||||
6. Open the **Hide the Account protection area** setting and set it to **Enabled**. Click **OK**.
|
||||
|
||||
@ -55,4 +55,4 @@ This can only be done in Group Policy.
|
||||
>[!NOTE]
|
||||
>If you hide all sections then the app will show a restricted interface, as in the following screenshot:
|
||||
>
|
||||
>
|
||||
>
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: App & browser control in the Windows Defender Security Center app
|
||||
title: App & browser control in the Windows Security app
|
||||
description: Use the App & browser control section to see and configure Windows Defender SmartScreen and Exploit protection settings.
|
||||
keywords: wdav, smartscreen, antivirus, wdsc, exploit, protection, hide
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
@ -44,7 +44,7 @@ You can only prevent users from modifying Exploit protection settings by using G
|
||||
|
||||
3. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
5. Expand the tree to **Windows components > Windows Defender Security Center > App and browser protection**.
|
||||
5. Expand the tree to **Windows components > Windows Security > App and browser protection**.
|
||||
|
||||
6. Open the **Prevent users from modifying settings** setting and set it to **Enabled**. Click **OK**.
|
||||
|
||||
@ -52,7 +52,7 @@ You can only prevent users from modifying Exploit protection settings by using G
|
||||
|
||||
## Hide the App & browser control section
|
||||
|
||||
You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Defender Security Center app, and its icon will not be shown on the navigiation bar on the side of the app.
|
||||
You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Security app, and its icon will not be shown on the navigiation bar on the side of the app.
|
||||
|
||||
This can only be done in Group Policy.
|
||||
|
||||
@ -65,7 +65,7 @@ This can only be done in Group Policy.
|
||||
|
||||
3. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
5. Expand the tree to **Windows components > Windows Defender Security Center > App and browser protection**.
|
||||
5. Expand the tree to **Windows components > Windows Security > App and browser protection**.
|
||||
|
||||
6. Open the **Hide the App and browser protection area** setting and set it to **Enabled**. Click **OK**.
|
||||
|
||||
@ -74,4 +74,4 @@ This can only be done in Group Policy.
|
||||
>[!NOTE]
|
||||
>If you hide all sections then the app will show a restricted interface, as in the following screenshot:
|
||||
>
|
||||
>
|
||||
>
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Customize Windows Defender Security Center contact information
|
||||
title: Customize Windows Security contact information
|
||||
description: Provide information to your employees on how to contact your IT department when a security issue occurs
|
||||
keywords: wdsc, security center, defender, notification, customize, contact, it department, help desk, call, help site
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
@ -14,7 +14,7 @@ ms.author: v-anbic
|
||||
ms.date: 04/30/2018
|
||||
---
|
||||
|
||||
# Customize the Windows Defender Security Center app for your organization
|
||||
# Customize the Windows Security app for your organization
|
||||
|
||||
**Applies to**
|
||||
|
||||
@ -28,7 +28,7 @@ ms.date: 04/30/2018
|
||||
|
||||
- Group Policy
|
||||
|
||||
You can add information about your organization in a contact card to the Windows Defender Security Center app. This can include a link to a support site, a phone number for a help desk, and an email address for email-based support.
|
||||
You can add information about your organization in a contact card to the Windows Security app. This can include a link to a support site, a phone number for a help desk, and an email address for email-based support.
|
||||
|
||||

|
||||
|
||||
@ -56,7 +56,7 @@ This can only be done in Group Policy.
|
||||
|
||||
3. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
5. Expand the tree to **Windows components > Windows Defender Security Center > Enterprise Customization**.
|
||||
5. Expand the tree to **Windows components > Windows Security > Enterprise Customization**.
|
||||
|
||||
6. You enable the contact card and the customized notifications by configuring two separate Group Policy settings. They will both use the same source of information (explained in Steps 7 and 8), and you can enable both or only one or the other:
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Device & performance health in the Windows Defender Security Center app
|
||||
title: Device & performance health in the Windows Security app
|
||||
description: Use the Device & performance health section to see the status of the machine and note any storage, update, battery, driver, or hardware configuration issues
|
||||
keywords: wdsc, windows update, storage, driver, device, installation, battery, health, status
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
@ -32,7 +32,7 @@ In Windows 10, version 1709 and later, the section can be hidden from users of t
|
||||
|
||||
## Hide the Device performance & health section
|
||||
|
||||
You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Defender Security Center app, and its icon will not be shown on the navigiation bar on the side of the app.
|
||||
You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Security app, and its icon will not be shown on the navigiation bar on the side of the app.
|
||||
|
||||
This can only be done in Group Policy.
|
||||
|
||||
@ -45,7 +45,7 @@ This can only be done in Group Policy.
|
||||
|
||||
3. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
5. Expand the tree to **Windows components > Windows Defender Security Center > Device performance and health**.
|
||||
5. Expand the tree to **Windows components > Windows Security > Device performance and health**.
|
||||
|
||||
6. Open the **Hide the Device performance and health area** setting and set it to **Enabled**. Click **OK**.
|
||||
|
||||
@ -54,4 +54,4 @@ This can only be done in Group Policy.
|
||||
>[!NOTE]
|
||||
>If you hide all sections then the app will show a restricted interface, as in the following screenshot:
|
||||
>
|
||||
>
|
||||
>
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Device security in the Windows Defender Security Center app
|
||||
title: Device security in the Windows Security app
|
||||
description: Use the Device security section to manage security built into your device, including virtualization-based security.
|
||||
keywords: device security, device guard, wdav, smartscreen, antivirus, wdsc, exploit, protection, hide
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
@ -11,25 +11,22 @@ ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: andreabichsel
|
||||
ms.author: v-anbic
|
||||
ms.date: 04/30/2018
|
||||
ms.date: 10/02/2018
|
||||
---
|
||||
|
||||
|
||||
# Device security
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10, version 1803 and later
|
||||
|
||||
|
||||
The **Device security** section contains information and settings for built-in device security.
|
||||
The **Device security** section contains information and settings for built-in device security.
|
||||
|
||||
You can choose to hide the section from users of the machine. This can be useful if you don't want employees in your organization to see or have access to user-configured options for the features shown in the section.
|
||||
|
||||
|
||||
## Hide the Device security section
|
||||
|
||||
You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Defender Security Center app, and its icon will not be shown on the navigiation bar on the side of the app.
|
||||
You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Security app, and its icon will not be shown on the navigiation bar on the side of the app.
|
||||
|
||||
This can only be done in Group Policy.
|
||||
|
||||
@ -40,15 +37,59 @@ This can only be done in Group Policy.
|
||||
|
||||
1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
|
||||
|
||||
3. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
2. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
5. Expand the tree to **Windows components > Windows Defender Security Center > Device security**.
|
||||
3. Expand the tree to **Windows components > Windows Security > Device security**.
|
||||
|
||||
6. Open the **Hide the Device security area** setting and set it to **Enabled**. Click **OK**.
|
||||
4. Open the **Hide the Device security area** setting and set it to **Enabled**. Click **OK**.
|
||||
|
||||
7. [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/en-us/library/ee663280(v=vs.85).aspx).
|
||||
5. [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/en-us/library/ee663280(v=vs.85).aspx).
|
||||
|
||||
>[!NOTE]
|
||||
>If you hide all sections then the app will show a restricted interface, as in the following screenshot:
|
||||
>
|
||||
>
|
||||
>
|
||||
|
||||
## Disable the Clear TPM button
|
||||
If you don't want users to be able to click the **Clear TPM** button in the Windows Security app, you can disable it.
|
||||
|
||||
>[!IMPORTANT]
|
||||
>### Requirements
|
||||
>
|
||||
>You must have Windows 10, version 1809 or later. The ADMX/ADML template files for earlier versions of Windows do not include these Group Policy settings.
|
||||
|
||||
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
|
||||
|
||||
2. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
3. Expand the tree to **Windows components > Windows Security > Device security**.
|
||||
|
||||
4. Open the **Disable the Clear TPM button** setting and set it to **Enabled**. Click **OK**.
|
||||
|
||||
5. [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/en-us/library/ee663280(v=vs.85).aspx).
|
||||
|
||||
## Hide the TPM Firmware Update recommendation
|
||||
If you don't want users to see the recommendation to update TPM firmware, you can disable it.
|
||||
|
||||
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
|
||||
|
||||
2. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
3. Expand the tree to **Windows components > Windows Security > Device security**.
|
||||
|
||||
4. Open the **Hide the TPM Firmware Update recommendation** setting and set it to **Enabled**. Click **OK**.
|
||||
|
||||
5. [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/en-us/library/ee663280(v=vs.85).aspx).
|
||||
|
||||
## Disable Memory integrity switch
|
||||
If you don't want users to be able to change the Hypervisor Control Integrity (HVCI), or memory integrity, setting on their computers, you can disable the **Memory integrity** switch.
|
||||
|
||||
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
|
||||
|
||||
2. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
3. Expand the tree to **Windows components > Windows Security > Device security**.
|
||||
|
||||
4. Open the **Disable Memory integrity switch** setting and set it to **Enabled**. Click **OK**.
|
||||
|
||||
5. [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/en-us/library/ee663280(v=vs.85).aspx).
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Family options in the Windows Defender Security Center app
|
||||
title: Family options in the Windows Security app
|
||||
description: Hide the Family options section in enterprise environments
|
||||
keywords: wdsc, family options, hide, suppress, remove, disable, uninstall, kids, parents, safety, parental, child, screen time
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
@ -24,14 +24,14 @@ ms.date: 04/30/2018
|
||||
|
||||
The **Family options** section contains links to settings and further information for parents of a Windows 10 PC. It is not generally intended for enterprise or business environments.
|
||||
|
||||
Home users can learn more at the [Help protection your family online in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4013209/windows-10-protect-your-family-online-in-windows-defender)
|
||||
Home users can learn more at the [Help protection your family online in Windows Security topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4013209/windows-10-protect-your-family-online-in-windows-defender)
|
||||
|
||||
In Windows 10, version 1709, the section can be hidden from users of the machine. This can be useful if you don't want employees in your organization to see or have access to this section.
|
||||
|
||||
|
||||
## Hide the Family options section
|
||||
|
||||
You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Defender Security Center app, and its icon will not be shown on the navigiation bar on the side of the app.
|
||||
You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Security app, and its icon will not be shown on the navigiation bar on the side of the app.
|
||||
|
||||
This can only be done in Group Policy.
|
||||
|
||||
@ -44,7 +44,7 @@ This can only be done in Group Policy.
|
||||
|
||||
3. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
5. Expand the tree to **Windows components > Windows Defender Security Center > Family options**.
|
||||
5. Expand the tree to **Windows components > Windows Security > Family options**.
|
||||
|
||||
6. Open the **Hide the Family options area** setting and set it to **Enabled**. Click **OK**.
|
||||
|
||||
@ -53,4 +53,4 @@ This can only be done in Group Policy.
|
||||
>[!NOTE]
|
||||
>If you hide all sections then the app will show a restricted interface, as in the following screenshot:
|
||||
>
|
||||
>
|
||||
>
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Firewall and network protection in the Windows Defender Security Center app
|
||||
title: Firewall and network protection in the Windows Security app
|
||||
description: Use the Firewall & network protection section to see the status of and make changes to firewalls and network connections for the machine.
|
||||
keywords: wdsc, firewall, windows defender firewall, network, connections, domain, private network, publish network, allow firewall, firewall rule, block firewall
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
@ -29,7 +29,7 @@ In Windows 10, version 1709 and later, the section can be hidden from users of t
|
||||
|
||||
## Hide the Firewall & network protection section
|
||||
|
||||
You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Defender Security Center app, and its icon will not be shown on the navigiation bar on the side of the app.
|
||||
You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Security app, and its icon will not be shown on the navigiation bar on the side of the app.
|
||||
|
||||
This can only be done in Group Policy.
|
||||
|
||||
@ -42,7 +42,7 @@ This can only be done in Group Policy.
|
||||
|
||||
3. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
5. Expand the tree to **Windows components > Windows Defender Security Center > Firewall and network protection**.
|
||||
5. Expand the tree to **Windows components > Windows Security > Firewall and network protection**.
|
||||
|
||||
6. Open the **Hide the Firewall and network protection area** setting and set it to **Enabled**. Click **OK**.
|
||||
|
||||
@ -51,5 +51,5 @@ This can only be done in Group Policy.
|
||||
>[!NOTE]
|
||||
>If you hide all sections then the app will show a restricted interface, as in the following screenshot:
|
||||
>
|
||||
>
|
||||
>
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Hide notifications from the Windows Defender Security Center app
|
||||
description: Prevent Windows Defender Security Center app notifications from appearing on user endpoints
|
||||
title: Hide notifications from the Windows Security app
|
||||
description: Prevent Windows Security app notifications from appearing on user endpoints
|
||||
keywords: defender, security center, app, notifications, av, alerts
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
@ -14,7 +14,7 @@ ms.author: v-anbic
|
||||
ms.date: 04/30/2018
|
||||
---
|
||||
|
||||
# Hide Windows Defender Security Center app notifications
|
||||
# Hide Windows Security app notifications
|
||||
|
||||
**Applies to**
|
||||
|
||||
@ -28,7 +28,7 @@ ms.date: 04/30/2018
|
||||
|
||||
- Group Policy
|
||||
|
||||
The Windows Defender Security Center app is used by a number of Windows security features to provide notifications about the health and security of the machine. These include notifications about firewalls, antivirus products, Windows Defender SmartScreen, and others.
|
||||
The Windows Security app is used by a number of Windows security features to provide notifications about the health and security of the machine. These include notifications about firewalls, antivirus products, Windows Defender SmartScreen, and others.
|
||||
|
||||
In some cases, it may not be appropriate to show these notifications, for example, if you want to hide regular status updates, or if you want to hide all notifications to the employees in your organization.
|
||||
|
||||
@ -58,7 +58,7 @@ This can only be done in Group Policy.
|
||||
|
||||
3. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
5. Expand the tree to **Windows components > Windows Defender Security Center > Notifications**.
|
||||
5. Expand the tree to **Windows components > Windows Security > Notifications**.
|
||||
|
||||
6. Open the **Hide non-critical notifications** setting and set it to **Enabled**. Click **OK**.
|
||||
|
||||
@ -67,7 +67,7 @@ This can only be done in Group Policy.
|
||||
|
||||
## Use Group Policy to hide all notifications
|
||||
|
||||
You can hide all notifications that are sourced from the Windows Defender Security Center app. This may be useful if you don't want users of the machines from inadvertently modifying settings, running antivirus scans, or otherwise performing security-related actions without your input.
|
||||
You can hide all notifications that are sourced from the Windows Security app. This may be useful if you don't want users of the machines from inadvertently modifying settings, running antivirus scans, or otherwise performing security-related actions without your input.
|
||||
|
||||
This can only be done in Group Policy.
|
||||
|
||||
@ -80,7 +80,7 @@ This can only be done in Group Policy.
|
||||
|
||||
3. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
5. Expand the tree to **Windows components > Windows Defender Security Center > Notifications**.
|
||||
5. Expand the tree to **Windows components > Windows Security > Notifications**.
|
||||
|
||||
6. Open the **Hide all notifications** setting and set it to **Enabled**. Click **OK**.
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Virus and threat protection in the Windows Defender Security Center app
|
||||
title: Virus and threat protection in the Windows Security app
|
||||
description: Use the Virus & threat protection section to see and configure Windows Defender Antivirus, Controlled folder access, and 3rd-party AV products.
|
||||
keywords: wdav, smartscreen, antivirus, wdsc, exploit, protection, hide
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
@ -28,7 +28,7 @@ In Windows 10, version 1803, this section also contains information and settings
|
||||
|
||||
IT administrators and IT pros can get more information and documentation about configuration from the following:
|
||||
|
||||
- [Windows Defender Antivirus in the Windows Defender Security Center app](../windows-defender-antivirus/windows-defender-security-center-antivirus.md)
|
||||
- [Windows Defender Antivirus in the Windows Security app](../windows-defender-antivirus/windows-defender-security-center-antivirus.md)
|
||||
- [Windows Defender Antivirus documentation library](../windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md)
|
||||
- [Protect important folders with Controlled folder access](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard)
|
||||
- [Defend yourself from cybercrime with new Office 365 capabilities](https://blogs.office.com/en-us/2018/04/05/defend-yourself-from-cybercrime-with-new-office-365-capabilities/)
|
||||
@ -40,7 +40,7 @@ You can choose to hide the **Virus & threat protection** section or the **Ransom
|
||||
|
||||
## Hide the Virus & threat protection section
|
||||
|
||||
You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Defender Security Center app, and its icon will not be shown on the navigiation bar on the side of the app.
|
||||
You can choose to hide the entire section by using Group Policy. The section will not appear on the home page of the Windows Security app, and its icon will not be shown on the navigiation bar on the side of the app.
|
||||
|
||||
This can only be done in Group Policy.
|
||||
|
||||
@ -53,7 +53,7 @@ This can only be done in Group Policy.
|
||||
|
||||
3. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
5. Expand the tree to **Windows components > Windows Defender Security Center > Virus and threat protection**.
|
||||
5. Expand the tree to **Windows components > Windows Security > Virus and threat protection**.
|
||||
|
||||
6. Open the **Hide the Virus and threat protection area** setting and set it to **Enabled**. Click **OK**.
|
||||
|
||||
@ -62,11 +62,11 @@ This can only be done in Group Policy.
|
||||
>[!NOTE]
|
||||
>If you hide all sections then the app will show a restricted interface, as in the following screenshot:
|
||||
>
|
||||
>
|
||||
>
|
||||
|
||||
## Hide the Ransomware protection area
|
||||
|
||||
You can choose to hide the **Ransomware protection** area by using Group Policy. The area will not appear on the **Virus & threat protection** section of the Windows Defender Security Center app.
|
||||
You can choose to hide the **Ransomware protection** area by using Group Policy. The area will not appear on the **Virus & threat protection** section of the Windows Security app.
|
||||
|
||||
This can only be done in Group Policy.
|
||||
|
||||
@ -79,7 +79,7 @@ This can only be done in Group Policy.
|
||||
|
||||
3. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
5. Expand the tree to **Windows components > Windows Defender Security Center > Virus and threat protection**.
|
||||
5. Expand the tree to **Windows components > Windows Security > Virus and threat protection**.
|
||||
|
||||
6. Open the **Hide the Ransomware data recovery area** setting and set it to **Enabled**. Click **OK**.
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Manage Windows Defender Security Center in Windows 10 in S mode
|
||||
description: Windows Defender Security Center settings are different in Windows 10 in S mode
|
||||
title: Manage Windows Security in Windows 10 in S mode
|
||||
description: Windows Security settings are different in Windows 10 in S mode
|
||||
keywords: windows 10 in s mode, windows 10 s, windows 10 s mode, wdav, smartscreen, antivirus, wdsc, firewall, device health, performance, Edge, browser, family, parental options, security, windows
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
@ -14,7 +14,7 @@ ms.author: v-anbic
|
||||
ms.date: 04/30/2018
|
||||
---
|
||||
|
||||
# Manage Windows Defender Security Center in Windows 10 in S mode
|
||||
# Manage Windows Security in Windows 10 in S mode
|
||||
|
||||
**Applies to**
|
||||
|
||||
@ -30,15 +30,15 @@ ms.date: 04/30/2018
|
||||
|
||||
Windows 10 in S mode is streamlined for tighter security and superior performance. With Windows 10 in S mode, users can only use apps from the Microsoft Store, ensuring Microsoft-verified security so you can minimize malware attacks. In addition, using Microsoft Edge provides a more secure browser experience, with extra protections against phishing and malicious software.
|
||||
|
||||
The Windows Defender Security Center interface is a little different in Windows 10 in S mode. The **Virus & threat protection** area has fewer options, because the built-in security of Windows 10 in S mode prevents viruses and other threats from running on devices in your organization. In addition, devices running Windows 10 in S mode receive security updates automatically.
|
||||
The Windows Security interface is a little different in Windows 10 in S mode. The **Virus & threat protection** area has fewer options, because the built-in security of Windows 10 in S mode prevents viruses and other threats from running on devices in your organization. In addition, devices running Windows 10 in S mode receive security updates automatically.
|
||||
|
||||

|
||||

|
||||
|
||||
For more information about Windows 10 in S mode, including how to switch out of S mode, see [Windows 10 Pro/Enterprise in S mode](https://docs.microsoft.com/en-us/windows/deployment/windows-10-pro-in-s-mode).
|
||||
|
||||
##Managing Windows Defender Security Center settings with Intune
|
||||
##Managing Windows Security settings with Intune
|
||||
|
||||
In the enterprise, you can only manage security settings for devices running Windows 10 in S mode with Microsoft Intune or other mobile device management apps. Windows 10 in S mode prevents making changes via PowerShell scripts.
|
||||
|
||||
For information about using Intune to manage Windows Defender Security Center settings on your organization's devices, see [Set up Intune](https://docs.microsoft.com/en-us/intune/setup-steps) and [Endpoint protection settings for Windows 10 (and later) in Intune](https://docs.microsoft.com/en-us/intune/endpoint-protection-windows-10).
|
||||
For information about using Intune to manage Windows Security settings on your organization's devices, see [Set up Intune](https://docs.microsoft.com/en-us/intune/setup-steps) and [Endpoint protection settings for Windows 10 (and later) in Intune](https://docs.microsoft.com/en-us/intune/endpoint-protection-windows-10).
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: The Windows Defender Security Center app
|
||||
description: The Windows Defender Security Center app brings together common Windows security features into one place
|
||||
title: The Windows Security app
|
||||
description: The Windows Security app brings together common Windows security features into one place
|
||||
keywords: wdav, smartscreen, antivirus, wdsc, firewall, device health, performance, Edge, browser, family, parental options, security, windows
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
@ -11,43 +11,35 @@ ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
author: andreabichsel
|
||||
ms.author: v-anbic
|
||||
ms.date: 04/30/2018
|
||||
ms.date: 10/02/2018
|
||||
---
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
# The Windows Defender Security Center app
|
||||
# The Windows Security app
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10, version 1703 and later
|
||||
|
||||
|
||||
|
||||
|
||||
In Windows 10, version 1709 and later, the app also shows information from third-party antivirus and firewall apps.
|
||||
|
||||
In Windows 10, version 1803, the app has two new areas, **Account protection** and **Device security**.
|
||||
|
||||
|
||||

|
||||
|
||||
|
||||
|
||||
In Windows 10, version 1709, we increased the scope of the app to also show information from third-party antivirus and firewall apps.
|
||||
|
||||
>[!NOTE]
|
||||
>The Windows Defender Security Center app is a client interface on Windows 10, version 1703 and later. It is not the Windows Defender Security Center web portal console that is used to review and manage [Windows Defender Advanced Threat Protection](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection).
|
||||
|
||||
This library describes the Windows Defender Security Center app, and provides information on configuring certain features, including:
|
||||
This library describes the Windows Security app, and provides information on configuring certain features, including:
|
||||
|
||||
<a id="customize-notifications-from-the-windows-defender-security-center"></a>
|
||||
- [Showing and customizing contact information on the app and in notifications](wdsc-customize-contact-information.md)
|
||||
- [Hiding notifications](wdsc-hide-notifications.md)
|
||||
|
||||
You can't uninstall the Windows Defender Security Center app, but you can do one of the following:
|
||||
In Windows 10, version 1709 and later, the app also shows information from third-party antivirus and firewall apps.
|
||||
|
||||
In Windows 10, version 1803, the app has two new areas, **Account protection** and **Device security**.
|
||||
|
||||

|
||||
|
||||
>[!NOTE]
|
||||
>The Windows Security app is a client interface on Windows 10, version 1703 and later. It is not the Windows Defender Security Center web portal console that is used to review and manage [Windows Defender Advanced Threat Protection](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection).
|
||||
|
||||
You can't uninstall the Windows Security app, but you can do one of the following:
|
||||
|
||||
- Disable the interface on Windows Server 2016. See [Windows Defender Antivirus on Windows Server 2016](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016).
|
||||
- Hide all of the sections on client computers (see below).
|
||||
@ -57,47 +49,43 @@ You can find more information about each section, including options for configur
|
||||
|
||||
|
||||
- [Virus & threat protection](wdsc-virus-threat-protection.md), which has information and access to antivirus ransomware protection settings and notifications, including the Controlled folder access feature of Windows Defender Exploit Guard and sign-in to Microsoft OneDrive.
|
||||
- [Account protection](wdsc-account-protection.md), which has information and access to sign-in and account protection settings.
|
||||
- [Account protection](wdsc-account-protection.md), which has information and access to sign-in and account protection settings.
|
||||
- [Firewall & network protection](wdsc-firewall-network-protection.md), which has information and access to firewall settings, including Windows Defender Firewall.
|
||||
- [App & browser control](wdsc-app-browser-control.md), covering Windows Defender SmartScreen settings and Exploit protection mitigations.
|
||||
- [Device security](wdsc-device-security.md), which provides access to built-in device security settings.
|
||||
- [Device performance & health](wdsc-device-performance-health.md), which has information about drivers, storage space, and general Windows Update issues.
|
||||
- [Device performance & health](wdsc-device-performance-health.md), which has information about drivers, storage space, and general Windows Update issues.
|
||||
- [Family options](wdsc-family-options.md), which includes access to parental controls along with tips and information for keeping kids safe online.
|
||||
|
||||
|
||||
>[!NOTE]
|
||||
>If you hide all sections then the app will show a restricted interface, as in the following screenshot:
|
||||
>
|
||||
>
|
||||
>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
## Open the Windows Defender Security Center app
|
||||
## Open the Windows Security app
|
||||
- Click the icon in the notification area on the taskbar.
|
||||
|
||||

|
||||
- Search the Start menu for **Windows Defender Security Center**.
|
||||

|
||||
- Search the Start menu for **Windows Security**.
|
||||
|
||||

|
||||

|
||||
- Open an area from Windows **Settings**.
|
||||
|
||||

|
||||

|
||||
|
||||
|
||||
> [!NOTE]
|
||||
> Settings configured with management tools, such as Group Policy, Microsoft Intune, or System Center Configuration Manager, will generally take precedence over the settings in the Windows Defender Security Center. See the topics for each of the sections for links to configuring the associated features or products.
|
||||
> Settings configured with management tools, such as Group Policy, Microsoft Intune, or System Center Configuration Manager, will generally take precedence over the settings in the Windows Security. See the topics for each of the sections for links to configuring the associated features or products.
|
||||
|
||||
|
||||
|
||||
## How the Windows Defender Security Center app works with Windows security features
|
||||
## How the Windows Security app works with Windows security features
|
||||
|
||||
|
||||
>[!IMPORTANT]
|
||||
>Windows Defender AV and the Windows Defender Security Center app use similarly named services for specific purposes.
|
||||
>Windows Defender AV and the Windows Security app use similarly named services for specific purposes.
|
||||
>
|
||||
>The Windows Defender Security Center app uses the Windows Defender Security Center Service (*SecurityHealthService* or *Windows Security Health Servce*), which in turn utilizes the Security Center service ([*wscsvc*](https://technet.microsoft.com/en-us/library/bb457154.aspx#EDAA)) to ensure the app provides the most up-to-date information about the protection status on the endpoint, including protection offered by third-party antivirus products, Windows Defender Firewall, third-party firewalls, and other security protection.
|
||||
>The Windows Security app uses the Windows Security Service (*SecurityHealthService* or *Windows Security Health Servce*), which in turn utilizes the Security Center service ([*wscsvc*](https://technet.microsoft.com/en-us/library/bb457154.aspx#EDAA)) to ensure the app provides the most up-to-date information about the protection status on the endpoint, including protection offered by third-party antivirus products, Windows Defender Firewall, third-party firewalls, and other security protection.
|
||||
>
|
||||
>These services do not affect the state of Windows Defender AV. Disabling or modifying these services will not disable Windows Defender AV, and will lead to a lowered protection state on the endpoint, even if you are using a third-party antivirus product.
|
||||
>
|
||||
@ -106,22 +94,22 @@ You can find more information about each section, including options for configur
|
||||
>Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security).
|
||||
|
||||
> [!WARNING]
|
||||
> If you disable the Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Defender Security Center app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device.
|
||||
> If you disable the Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Security app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device.
|
||||
>
|
||||
>It may also prevent Windows Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed.
|
||||
>
|
||||
>This will significantly lower the protection of your device and could lead to malware infection.
|
||||
|
||||
The Windows Defender Security Center app operates as a separate app or process from each of the individual features, and will display notifications through the Action Center.
|
||||
The Windows Security app operates as a separate app or process from each of the individual features, and will display notifications through the Action Center.
|
||||
|
||||
It acts as a collector or single place to see the status and perform some configuration for each of the features.
|
||||
|
||||
Disabling any of the individual features (through Group Policy or other management tools, such as System Center Configuration Manager) will prevent that feature from reporting its status in the Windows Defender Security Center app. The Windows Defender Security Center app itself will still run and show status for the other security features.
|
||||
Disabling any of the individual features (through Group Policy or other management tools, such as System Center Configuration Manager) will prevent that feature from reporting its status in the Windows Security app. The Windows Security app itself will still run and show status for the other security features.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Individually disabling any of the services will not disable the other services or the Windows Defender Security Center app.
|
||||
> Individually disabling any of the services will not disable the other services or the Windows Security app.
|
||||
|
||||
For example, [using a third-party antivirus will disable Windows Defender Antivirus](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility). However, the Windows Defender Security Center app will still run, show its icon in the taskbar, and display information about the other features, such as Windows Defender SmartScreen and Windows Defender Firewall.
|
||||
For example, [using a third-party antivirus will disable Windows Defender Antivirus](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility). However, the Windows Security app will still run, show its icon in the taskbar, and display information about the other features, such as Windows Defender SmartScreen and Windows Defender Firewall.
|
||||
|
||||
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Set up and use Windows Defender SmartScreen on individual devices (Windows 10)
|
||||
description: Steps about what happens when an employee tries to run an app, how employees can report websites as safe or unsafe, and how employees can use the Windows Defender Security Center to set Windows Defender SmartScreen for individual devices.
|
||||
description: Steps about what happens when an employee tries to run an app, how employees can report websites as safe or unsafe, and how employees can use the Windows Security to set Windows Defender SmartScreen for individual devices.
|
||||
keywords: SmartScreen Filter, Windows SmartScreen
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: explore
|
||||
@ -19,14 +19,14 @@ ms.date: 10/13/2017
|
||||
|
||||
Windows Defender SmartScreen helps to protect your employees if they try to visit sites previously reported as phishing or malware websites, or if an employee tries to download potentially malicious files.
|
||||
|
||||
## How employees can use Windows Defender Security Center to set up Windows Defender SmartScreen
|
||||
Starting with Windows 10, version 1703 your employees can use Windows Defender Security Center to set up Windows Defender SmartScreen for an individual device; unless you've used Group Policy or Microsoft Intune to prevent it.
|
||||
## How employees can use Windows Security to set up Windows Defender SmartScreen
|
||||
Starting with Windows 10, version 1703 your employees can use Windows Security to set up Windows Defender SmartScreen for an individual device; unless you've used Group Policy or Microsoft Intune to prevent it.
|
||||
|
||||
>[!NOTE]
|
||||
>If any of the following settings are managed through Group Policy or mobile device management (MDM) settings, it appears as unavailable to the employee.
|
||||
|
||||
**To use Windows Defender Security Center to set up Windows Defender SmartScreen on a device**
|
||||
1. Open the Windows Defender Security Center app, and then click **App & browser control**.
|
||||
**To use Windows Security to set up Windows Defender SmartScreen on a device**
|
||||
1. Open the Windows Security app, and then click **App & browser control**.
|
||||
|
||||
2. In the **App & browser control** screen, choose from the following options:
|
||||
|
||||
@ -52,7 +52,7 @@ Starting with Windows 10, version 1703 your employees can use Windows Defender S
|
||||
|
||||
- **Off.** Turns off SmartScreen, so an employee isn't alerted or stopped from visiting sites or from downloading potentially malicious apps and files.
|
||||
|
||||

|
||||

|
||||
|
||||
## How SmartScreen works when an employee tries to run an app
|
||||
Windows Defender SmartScreen checks the reputation of any web-based app the first time it's run from the Internet, checking digital signatures and other factors against a Microsoft-maintained service. If an app has no reputation or is known to be malicious, SmartScreen can warn the employee or block the app from running entirely, depending on how you've configured the feature to run in your organization.
|
||||
|
Loading…
x
Reference in New Issue
Block a user