diff --git a/windows/keep-secure/add-apps-to-protected-list-using-custom-uri.md b/windows/keep-secure/add-apps-to-protected-list-using-custom-uri.md index d552872133..f9f2b37466 100644 --- a/windows/keep-secure/add-apps-to-protected-list-using-custom-uri.md +++ b/windows/keep-secure/add-apps-to-protected-list-using-custom-uri.md @@ -17,7 +17,7 @@ author: brianlic-msft - Windows 10 Insider Preview - Windows 10 Mobile Preview -\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows SDK Insider Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] +\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows 10 Anniversary SDK Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] Add multiple apps to your enterprise data protection (EDP) **Protected Apps** list at the same time, by using the Microsoft Intune Custom URI functionality and the AppLocker Group Policy. For more info about how to create a custom URI using Intune, see [Windows 10 custom policy settings in Microsoft Intune](http://go.microsoft.com/fwlink/?LinkID=691330). diff --git a/windows/keep-secure/audit-pnp-activity.md b/windows/keep-secure/audit-pnp-activity.md index 0209ff42eb..c36f2bb35f 100644 --- a/windows/keep-secure/audit-pnp-activity.md +++ b/windows/keep-secure/audit-pnp-activity.md @@ -15,7 +15,7 @@ author: brianlic-msft - Windows 10 -\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows SDK Insider Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] +\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows 10 Anniversary SDK Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] This topic for the IT professional describes the advanced security audit policy setting, **Audit PNP Activity**, which determines when plug and play detects an external device. diff --git a/windows/keep-secure/basic-audit-directory-service-access.md b/windows/keep-secure/basic-audit-directory-service-access.md index aac3d70457..4ec4bdf05a 100644 --- a/windows/keep-secure/basic-audit-directory-service-access.md +++ b/windows/keep-secure/basic-audit-directory-service-access.md @@ -15,7 +15,7 @@ author: brianlic-msft - Windows 10 -\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows SDK Insider Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] +\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows 10 Anniversary SDK Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] Determines whether to audit the event of a user accessing an Active Directory object that has its own system access control list (SACL) specified. diff --git a/windows/keep-secure/basic-audit-logon-events.md b/windows/keep-secure/basic-audit-logon-events.md index dbee948abf..0b162e2b7a 100644 --- a/windows/keep-secure/basic-audit-logon-events.md +++ b/windows/keep-secure/basic-audit-logon-events.md @@ -15,7 +15,7 @@ author: brianlic-msft - Windows 10 -\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows SDK Insider Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] +\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows 10 Anniversary SDK Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] Determines whether to audit each instance of a user logging on to or logging off from a device. diff --git a/windows/keep-secure/create-edp-policy-using-intune.md b/windows/keep-secure/create-edp-policy-using-intune.md index 645179597f..1d155abd46 100644 --- a/windows/keep-secure/create-edp-policy-using-intune.md +++ b/windows/keep-secure/create-edp-policy-using-intune.md @@ -16,7 +16,7 @@ author: brianlic-msft - Windows 10 Insider Preview - Windows 10 Mobile Preview -\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows SDK Insider Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] +\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows 10 Anniversary SDK Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] Microsoft Intune helps you create and deploy your enterprise data protection (EDP) policy, including letting you choose your protected apps, your EDP-protection level, and how to find enterprise data on the network. diff --git a/windows/keep-secure/create-edp-policy-using-sccm.md b/windows/keep-secure/create-edp-policy-using-sccm.md index 69e3b41aed..f13072bfcf 100644 --- a/windows/keep-secure/create-edp-policy-using-sccm.md +++ b/windows/keep-secure/create-edp-policy-using-sccm.md @@ -17,7 +17,7 @@ author: brianlic-msft - Windows 10 Mobile Preview - System Center Configuration Manager (version 1511 or later) -\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows SDK Insider Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] +\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows 10 Anniversary SDK Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] Configuration Manager (version 1511 or later) helps you create and deploy your enterprise data protection (EDP) policy, including letting you choose your protected apps, your EDP-protection level, and how to find enterprise data on the network. diff --git a/windows/keep-secure/create-vpn-and-edp-policy-using-intune.md b/windows/keep-secure/create-vpn-and-edp-policy-using-intune.md index ff7c743244..8fffdbba98 100644 --- a/windows/keep-secure/create-vpn-and-edp-policy-using-intune.md +++ b/windows/keep-secure/create-vpn-and-edp-policy-using-intune.md @@ -17,7 +17,7 @@ author: brianlic-msft - Windows 10 Insider Preview - Windows 10 Mobile Preview -\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows SDK Insider Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] +\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows 10 Anniversary SDK Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] After you've created and deployed your enterprise data protection (EDP) policy, you can use Microsoft Intune to create and deploy your Virtual Private Network (VPN) policy, linking it to your EDP policy. diff --git a/windows/keep-secure/deploy-edp-policy-using-intune.md b/windows/keep-secure/deploy-edp-policy-using-intune.md index 3221be8c89..b9aadc8bb9 100644 --- a/windows/keep-secure/deploy-edp-policy-using-intune.md +++ b/windows/keep-secure/deploy-edp-policy-using-intune.md @@ -17,7 +17,7 @@ author: brianlic-msft - Windows 10 Insider Preview - Windows 10 Mobile Preview -\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows SDK Insider Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] +\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows 10 Anniversary SDK Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] After you’ve created your enterprise data protection (EDP) policy, you'll need to deploy it to your organization's enrolled devices. Enrollment can be done for business or personal devices, allowing the devices to use your managed apps and to sync with your managed content and information. diff --git a/windows/keep-secure/enlightened-microsoft-apps-and-edp.md b/windows/keep-secure/enlightened-microsoft-apps-and-edp.md index 4c57c9316f..8aff64bc07 100644 --- a/windows/keep-secure/enlightened-microsoft-apps-and-edp.md +++ b/windows/keep-secure/enlightened-microsoft-apps-and-edp.md @@ -17,7 +17,7 @@ author: brianlic-msft - Windows 10 Insider Preview - Windows 10 Mobile Preview -\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows SDK Insider Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] +\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows 10 Anniversary SDK Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] Learn the difference between enlightened and unenlightened apps, and then review the list of enlightened apps provided by Microsoft along with the text you will need to use to add them to your **Protected Apps** list. diff --git a/windows/keep-secure/guidance-and-best-practices-edp.md b/windows/keep-secure/guidance-and-best-practices-edp.md index 1d4c939c5c..86d30b658a 100644 --- a/windows/keep-secure/guidance-and-best-practices-edp.md +++ b/windows/keep-secure/guidance-and-best-practices-edp.md @@ -17,7 +17,7 @@ author: brianlic-msft - Windows 10 Insider Preview - Windows 10 Mobile Preview -\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows SDK Insider Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] +\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows 10 Anniversary SDK Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] This section includes info about the enlightened Microsoft apps, including how to add them to your **Protected Apps** list in Microsoft Intune. It also includes some testing scenarios that we recommend running through with enterprise data protection (EDP). diff --git a/windows/keep-secure/implement-microsoft-passport-in-your-organization.md b/windows/keep-secure/implement-microsoft-passport-in-your-organization.md index 072f6d269c..07672ba61f 100644 --- a/windows/keep-secure/implement-microsoft-passport-in-your-organization.md +++ b/windows/keep-secure/implement-microsoft-passport-in-your-organization.md @@ -29,216 +29,267 @@ The Group Policy setting **Turn on PIN sign-in** does not apply to Windows 10. The following table lists the Group Policy settings that you can configure for Passport use in your workplace. These policy settings are available in **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Passport for Work**. -Policy -Options -Use Microsoft Passport for Work -**Not configured**: Users can provision Passport for Work, which encrypts their domain password. - -**Enabled**: Device provisions Passport for Work using keys or certificates for all users. - -**Disabled**: Device does not provision Passport for Work for any user. - -Use a hardware security device -**Not configured**: Passport for Work will be provisioned using TPM if available, and will be provisioned using software if TPM is not available. - -**Enabled**: Passport for Work will only be provisioned using TPM. - -**Disabled**: Passport for Work will be provisioned using TPM if available, and will be provisioned using software if TPM is not available. - -Use biometrics -**Not configured**: Biometrics can be used as a gesture in place of a PIN. - -**Enabled**: Biometrics can be used as a gesture in place of a PIN. - -**Disabled**: Only a PIN can be used as a gesture. - -PIN Complexity -Require digits -**Not configured**: Users must include a digit in their PIN. - -**Enabled**: Users must include a digit in their PIN. - -**Disabled**: Users cannot use digits in their PIN. - -Require lowercase letters -**Not configured**: Users cannot use lowercase letters in their PIN. - -**Enabled**: Users must include at least one lowercase letter in their PIN. - -**Disabled**: Users cannot use lowercase letters in their PIN. - -Maximum PIN length -**Not configured**: PIN length must be less than or equal to 127. - -**Enabled**: PIN length must be less than or equal to the number you specify. - -**Disabled**: PIN length must be less than or equal to 127. - -Minimum PIN length -**Not configured**: PIN length must be greater than or equal to 4. - -**Enabled**: PIN length must be greater than or equal to the number you specify. - -**Disabled**: PIN length must be greater than or equal to 4. - -Expiration -**Not configured**: PIN does not expire. - -**Enabled**: PIN can be set to expire after any number of days between 1 and 730, or PIN can be set to never expire by setting policy to 0. - -**Disabled**: PIN does not expire. - -History -**Not configured**: Previous PINs are not stored. - -**Enabled**: Specify the number of previous PINs that can be associated to a user account that can't be reused. - -**Disabled**: Previous PINs are not stored. - -**Note**  Current PIN is included in PIN history. - -  - -Require special characters -**Not configured**: Users cannot include a special character in their PIN. - -**Enabled**: Users must include at least one special character in their PIN. - -**Disabled**: Users cannot include a special character in their PIN. - -Require uppercase letters -**Not configured**: Users cannot include an uppercase letter in their PIN. - -**Enabled**: Users must include at least one uppercase letter in their PIN. - -**Disabled**: Users cannot include an uppercase letter in their PIN. - -[Remote Passport](prepare-people-to-use-microsoft-passport.md#bmk-remote) -Use Remote Passport - -**Note**  Applies to desktop only. Phone sign-in is currently limited to select Technology Adoption Program (TAP) participants. - -  - -**Not configured**: Remote Passport is disabled. - -**Enabled**: Users can use a portable, registered device as a companion device for desktop authentication. - -**Disabled**: Remote Passport is disabled. - -  + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
PolicyOptions
Use Microsoft Passport for Work +

Not configured: Users can provision Passport for Work, which encrypts their domain password.

+

Enabled: Device provisions Passport for Work using keys or certificates for all users.

+

Disabled: Device does not provision Passport for Work for any user.

+
Use a hardware security device +

Not configured: Passport for Work will be provisioned using TPM if available, and will be provisioned using software if TPM is not available.

+

Enabled: Passport for Work will only be provisioned using TPM.

+

Disabled: Passport for Work will be provisioned using TPM if available, and will be provisioned using software if TPM is not available.

+
Use biometrics +

Not configured: Biometrics can be used as a gesture in place of a PIN.

+

Enabled: Biometrics can be used as a gesture in place of a PIN.

+

Disabled: Only a PIN can be used as a gesture.

+
PIN ComplexityRequire digits +

Not configured: Users must include a digit in their PIN.

+

Enabled: Users must include a digit in their PIN.

+

Disabled: Users cannot use digits in their PIN.

+
Require lowercase letters +

Not configured: Users cannot use lowercase letters in their PIN.

+

Enabled: Users must include at least one lowercase letter in their PIN.

+

Disabled: Users cannot use lowercase letters in their PIN.

+
Maximum PIN length +

Not configured: PIN length must be less than or equal to 127.

+

Enabled: PIN length must be less than or equal to the number you specify.

+

Disabled: PIN length must be less than or equal to 127.

+
Minimum PIN length +

Not configured: PIN length must be greater than or equal to 4.

+

Enabled: PIN length must be greater than or equal to the number you specify.

+

Disabled: PIN length must be greater than or equal to 4.

+
Expiration +

Not configured: PIN does not expire.

+

Enabled: PIN can be set to expire after any number of days between 1 and 730, or PIN can be set to never expire by setting policy to 0.

+

Disabled: PIN does not expire.

+
History +

Not configured: Previous PINs are not stored.

+

Enabled: Specify the number of previous PINs that can be associated to a user account that can't be reused.

+

Disabled: Previous PINs are not stored.

+
Note  Current PIN is included in PIN history.
+
 
+
Require special characters +

Not configured: Users cannot include a special character in their PIN.

+

Enabled: Users must include at least one special character in their PIN.

+

Disabled: Users cannot include a special character in their PIN.

+
Require uppercase letters +

Not configured: Users cannot include an uppercase letter in their PIN.

+

Enabled: Users must include at least one uppercase letter in their PIN.

+

Disabled: Users cannot include an uppercase letter in their PIN.

+
Remote Passport +

Use Remote Passport

+
Note  Applies to desktop only. Phone sign-in is currently limited to select Technology Adoption Program (TAP) participants.
+
 
+
+

Not configured: Remote Passport is disabled.

+

Enabled: Users can use a portable, registered device as a companion device for desktop authentication.

+

Disabled: Remote Passport is disabled.

+
## MDM policy settings for Passport The following table lists the MDM policy settings that you can configure for Passport use in your workplace. These MDM policy settings use the [PassportForWork configuration service provider (CSP)](http://go.microsoft.com/fwlink/p/?LinkId=692070). -Policy -Scope -Default -Options -UsePassportForWork -Device -True -True: Passport will be provisioned for all users on the device. - -False: Users will not be able to provision Passport. - -**Note**  If Passport is enabled, and then the policy is changed to False, users who previously set up Passport can continue to use it, but will not be able to set up Passport on other devices. - -  - -RequireSecurityDevice -Device -False -True: Passport will only be provisioned using TPM. - -False: Passport will be provisioned using TPM if available, and will be provisioned using software if TPM is not available. - -Biometrics -UseBiometrics - -Device -False -True: Biometrics can be used as a gesture in place of a PIN for domain logon. - -False: Only a PIN can be used as a gesture for domain logon. - -FacialFeaturesUser - -EnhancedAntiSpoofing - -Device -Not configured -Not configured: users can choose whether to turn on enhanced anti-spoofing. - -True: Enhanced anti-spoofing is required on devices which support it. - -False: Users cannot turn on enhanced anti-spoofing. - -PINComplexity -Digits -Device or user -2 -1: Numbers are not allowed. - -2: At least one number is required. - -Lowercase letters -Device or user -1 -1: Lowercase letters are not allowed. - -2: At least one lowercase letter is required. - -Maximum PIN length -Device or user -127 -Maximum length that can be set is 127. Maximum length cannot be less than minimum setting. - -Minimum PIN length -Device or user -4 -Minimum length that can be set is 4. Minimum length cannot be greater than maximum setting. - -Expiration -Device or user -0 -Integer value specifies the period of time (in days) that a PIN can be used before the system requires the user to change it. The largest number you can configure for this policy setting is 730. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then the user’s PIN will never expire. - -History -Device or user -0 -Integer value that specifies the number of past PINs that can be associated to a user account that can’t be reused. The largest number you can configure for this policy setting is 50. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then storage of previous PINs is not required. - -Special characters -Device or user -1 -1: Special characters are not allowed. - -2: At least one special character is required. - -Uppercase letters -Device or user -1 -1: Uppercase letters are not allowed - -2: At least one uppercase letter is required - -Remote -UseRemotePassport - -**Note**  Applies to desktop only. Phone sign-in is currently limited to select Technology Adoption Program (TAP) participants. - -  - -Device or user -False -True: [Remote Passport](prepare-people-to-use-microsoft-passport.md#bmk-remote) is enabled. - -False: [Remote Passport](prepare-people-to-use-microsoft-passport.md#bmk-remote) is disabled. - -  + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
PolicyScopeDefaultOptions
UsePassportForWorkDeviceTrue +

True: Passport will be provisioned for all users on the device.

+

False: Users will not be able to provision Passport.

+
Note  If Passport is enabled, and then the policy is changed to False, users who previously set up Passport can continue to use it, but will not be able to set up Passport on other devices.
+
 
+
RequireSecurityDeviceDeviceFalse +

True: Passport will only be provisioned using TPM.

+

False: Passport will be provisioned using TPM if available, and will be provisioned using software if TPM is not available.

+
Biometrics +

UseBiometrics

+
Device False +

True: Biometrics can be used as a gesture in place of a PIN for domain logon.

+

False: Only a PIN can be used as a gesture for domain logon.

+
+

FacialFeaturesUser

+

EnhancedAntiSpoofing

+
DeviceNot configured +

Not configured: users can choose whether to turn on enhanced anti-spoofing.

+

True: Enhanced anti-spoofing is required on devices which support it.

+

False: Users cannot turn on enhanced anti-spoofing.

+
PINComplexity
Digits Device or user2 +

1: Numbers are not allowed.

+

2: At least one number is required.

+
Lowercase letters Device or user1 +

1: Lowercase letters are not allowed.

+

2: At least one lowercase letter is required.

+
Maximum PIN length Device or user127 +

Maximum length that can be set is 127. Maximum length cannot be less than minimum setting.

+
Minimum PIN lengthDevice or user4 +

Minimum length that can be set is 4. Minimum length cannot be greater than maximum setting.

+
Expiration Device or user0 +

Integer value specifies the period of time (in days) that a PIN can be used before the system requires the user to change it. The largest number you can configure for this policy setting is 730. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then the user’s PIN will never expire. +

+
HistoryDevice or user0 +

Integer value that specifies the number of past PINs that can be associated to a user account that can’t be reused. The largest number you can configure for this policy setting is 50. The lowest number you can configure for this policy setting is 0. If this policy is set to 0, then storage of previous PINs is not required. +

+
Special charactersDevice or user1 +

1: Special characters are not allowed.

+

2: At least one special character is required.

+
Uppercase lettersDevice or user1 +

1: Uppercase letters are not allowed

+

2: At least one uppercase letter is required

+
Remote +

UseRemotePassport

+
Note  Applies to desktop only. Phone sign-in is currently limited to select Technology Adoption Program (TAP) participants.
+
 
+
Device or userFalse +

True: Remote Passport is enabled.

+

False: Remote Passport is disabled.

+
**Note**   If policy is not configured to explicitly require letters or special characters, users will be restricted to creating a numeric PIN. diff --git a/windows/keep-secure/overview-create-edp-policy.md b/windows/keep-secure/overview-create-edp-policy.md index e5dea375ea..46470474a9 100644 --- a/windows/keep-secure/overview-create-edp-policy.md +++ b/windows/keep-secure/overview-create-edp-policy.md @@ -16,7 +16,7 @@ author: brianlic-msft - Windows 10 Insider Preview - Windows 10 Mobile Preview -\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows SDK Insider Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] +\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows 10 Anniversary SDK Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] Microsoft Intune and System Center Configuration Manager (version 1511 or later) helps you create and deploy your enterprise data protection (EDP) policy, including letting you choose your protected apps, your EDP-protection level, and how to find enterprise data on the network. diff --git a/windows/keep-secure/protect-enterprise-data-using-edp.md b/windows/keep-secure/protect-enterprise-data-using-edp.md index 0e86ceaa39..213f3323cb 100644 --- a/windows/keep-secure/protect-enterprise-data-using-edp.md +++ b/windows/keep-secure/protect-enterprise-data-using-edp.md @@ -17,7 +17,7 @@ author: brianlic-msft - Windows 10 Insider Preview - Windows 10 Mobile Preview -\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows SDK Insider Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] +\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows 10 Anniversary SDK Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] With the increase of employee-owned devices in the enterprise, there’s also an increasing risk of accidental data leak through apps and services, like email, social media, and the public cloud, which are outside of the enterprise’s control. For example, when an employee sends the latest engineering pictures to their personal email account, copies and pastes product info to a public Yammer group or tweet, or saves an in-progress sales report to their public cloud storage. diff --git a/windows/keep-secure/testing-scenarios-for-edp.md b/windows/keep-secure/testing-scenarios-for-edp.md index dd6d80009f..f8aad32a51 100644 --- a/windows/keep-secure/testing-scenarios-for-edp.md +++ b/windows/keep-secure/testing-scenarios-for-edp.md @@ -13,7 +13,7 @@ author: brianlic-msft - Windows 10 Insider Preview - Windows 10 Mobile Preview -\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows SDK Insider Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] +\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows 10 Anniversary SDK Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] We've come up with a list of suggested testing scenarios that you can use to test enterprise data protection (EDP) in your company. diff --git a/windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md b/windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md index 175cda08c3..d0774c6bba 100644 --- a/windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md +++ b/windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md @@ -39,1517 +39,2639 @@ Use the information in this table to help troubleshoot Windows Defender client e You can find a complete list of the Microsoft antimalware *event IDs*, the symbol, and the description of each ID in [Windows Server Antimalware Events TechNet](https://technet.microsoft.com/library/dn913615.aspx). -  - -Event ID: 1000 -Symbolic name: - -**MALWAREPROTECTION\_SCAN\_STARTED** - -Message: - -**An antimalware scan started.** - -Description: - -Scan ID: <ID number of the relevant scan.> -Scan Type: <Scan type>, for example: -- Antivirus -- Antispyware -- Antimalware - -Scan Parameters: <Scan parameters>, for example: -- Full scan -- Quick scan -- Customer scan - -Scan Resources: <Resources (such as files/directories/BHO) that were scanned.> -User: <Domain>\\<User> -Event ID: 1001 -Symbolic name: - -**MALWAREPROTECTION\_SCAN\_COMPLETED** - -Message: - -**An antimalware scan finished.** - -Description: - -Scan ID: <ID number of the relevant scan.> -Scan Type: <Scan type>, for example: -- Antivirus -- Antispyware -- Antimalware - -Scan Parameters: <Scan parameters>, for example: -- Full scan -- Quick scan -- Customer scan - -User: <Domain>\\<User> -Scan Time: <The duration of a scan.> -Event ID: 1002 -Symbolic name: - -**MALWAREPROTECTION\_SCAN\_CANCELLED** - -Message: - -**An antimalware scan was stopped before it finished.** - -Description: - -Scan ID: <ID number of the relevant scan.> -Scan Type: <Scan type>, for example: -- Antivirus -- Antispyware -- Antimalware - -Scan Parameters: <Scan parameters>, for example: -- Full scan -- Quick scan -- Customer scan - -User: <Domain>\\<User> -Scan Time: <The duration of a scan.> -Event ID: 1003 -Symbolic name: - -**MALWAREPROTECTION\_SCAN\_PAUSED** - -Message: - -**An antimalware scan was paused.** - -Description: - -Scan ID: <ID number of the relevant scan.> -Scan Type: <Scan type>, for example: -- Antivirus -- Antispyware -- Antimalware - -Scan Parameters: <Scan parameters>, for example: -- Full scan -- Quick scan -- Customer scan - -User: <Domain>\\<User> -Event ID: 1004 -Symbolic name: - -**MALWAREPROTECTION\_SCAN\_RESUMED** - -Message: - -**An antimalware scan was resumed.** - -Description: - -Scan ID: <ID number of the relevant scan.> -Scan Type: <Scan type>, for example: -- Antivirus -- Antispyware -- Antimalware - -Scan Parameters: <Scan parameters>, for example: -- Full scan -- Quick scan -- Customer scan - -User: <Domain>\\<User> -Event ID: 1005 -Symbolic name: - -**MALWAREPROTECTION\_SCAN\_FAILED** - -Message: - -**An antimalware scan failed.** - -Description: - -Scan ID: <ID number of the relevant scan.> -Scan Type: <Scan type>, for example: -- Antivirus -- Antispyware -- Antimalware - -Scan Parameters: <Scan parameters>, for example: -- Full scan -- Quick scan -- Customer scan - -User: <Domain>\\<User> -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -User action: - -The Windows Defender client encountered an error, and the current scan has stopped. The scan might fail due to a client-side issue. This event record includes the scan ID, type of scan (antivirus, antispyware, antimalware), scan parameters, the user that started the scan, the error code, and a description of the error. - -To troubleshoot this event: - -1. Run the scan again. -2. If it fails in the same way, go to the [Microsoft Support site](http://go.microsoft.com/fwlink/?LinkId=215163), enter the error number in the **Search** box to look for the error code. -3. Contact [Microsoft Technical Support](http://go.microsoft.com/fwlink/?LinkId=215491). - -Event ID: 1006 -Symbolic name: - -**MALWAREPROTECTION\_MALWARE\_DETECTED** - -Message: - -**The antimalware engine found malware or other potentially unwanted software.** - -Description: - -For more information please see the following: - -Name: <Threat name> -ID: <Threat ID> -Severity: <Severity>, for example: -- Low -- Moderate -- High -- Severe - -Category: <Category description>, for example, any threat or malware type. -Path: <File path> -Detection Origin: <Detection origin>, for example: -- Unknown -- Local computer -- Network share -- Internet -- Incoming traffic -- Outgoing traffic - -Detection Type: <Detection type>, for example: -- Heuristics -- Generic -- Concrete -- Dynamic signature - -Detection Source: <Detection source> for example: -- User: user initiated -- System: system initiated -- Real-time: real-time component initiated -- IOAV: IE Downloads and Outlook Express Attachments initiated -- NIS: Network inspection system -- IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls -- Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence -- Remote attestation - -Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. UAC -Status: <Status> -User: <Domain>\\<User> -Process Name: <Process in the PID> -Signature Version: <Definition version> -Engine Version: <Antimalware Engine version> -Event ID: 1007 -Symbolic name: - -**MALWAREPROTECTION\_MALWARE\_ACTION\_TAKEN** - -Message: - -**The antimalware platform performed an action to protect your system from malware or other potentially unwanted software.** - -Description: - -Windows Defender has taken action to protect this machine from malware or other potentially unwanted software. For more information please see the following: - -User: <Domain>\\<User> -Name: <Threat name> -ID: <Threat ID> -Severity: <Severity>, for example: -- Low -- Moderate -- High -- Severe - -Category: <Category description>, for example, any threat or malware type. -Action: <Action>, for example: -- Clean: The resource was cleaned -- Quarantine: The resource was quarantined -- Remove: The resource was deleted -- Allow: The resource was allowed to execute/exist -- User defined: User defined action which is normally one from this list of actions that the user has specified -- No action: No action -- Block: The resource was blocked from executing - -Status: <Status> -Signature Version: <Definition version> -Engine Version: <Antimalware Engine version> -Event ID: 1008 -Symbolic name: - -**MALWAREPROTECTION\_MALWARE\_ACTION\_FAILED** - -Message: - -**The antimalware platform attempted to perform an action to protect your system from malware or other potentially unwanted software, but the action failed.** - -Description: - -Windows Defender has encountered an error when taking action on malware or other potentially unwanted software. For more information please see the following: - -User: <Domain>\\<User> -Name: <Threat name> -ID: <Threat ID> -Severity: <Severity>, for example: -- Low -- Moderate -- High -- Severe - -Category: <Category description>, for example, any threat or malware type. -Path: <File path> -Action: <Action>, for example: -- Clean: The resource was cleaned -- Quarantine: The resource was quarantined -- Remove: The resource was deleted -- Allow: The resource was allowed to execute/exist -- User defined: User defined action which is normally one from this list of actions that the user has specified -- No action: No action -- Block: The resource was blocked from executing - -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -Status: <Status> -Signature Version: <Definition version> -Engine Version: <Antimalware Engine version> -Event ID: 1009 -Symbolic name: - -**MALWAREPROTECTION\_QUARANTINE\_RESTORE** - -Message: - -**The antimalware platform restored an item from quarantine.** - -Description: - -Windows Defender has restored an item from quarantine. For more information please see the following: - -Name: <Threat name> -ID: <Threat ID> -Severity: <Severity>, for example: -- Low -- Moderate -- High -- Severe - -Category: <Category description>, for example, any threat or malware type. -Path: <File path> -User: <Domain>\\<User> -Signature Version: <Definition version> -Engine Version: <Antimalware Engine version> -Event ID: 1010 -Symbolic name: - -**MALWAREPROTECTION\_QUARANTINE\_RESTORE\_FAILED** - -Message: - -**The antimalware platform could not restore an item from quarantine.** - -Description: - -Windows Defender has encountered an error trying to restore an item from quarantine. For more information please see the following: - -Name: <Threat name> -ID: <Threat ID> -Severity: <Severity>, for example: -- Low -- Moderate -- High -- Severe - -Category: <Category description>, for example, any threat or malware type. -Path: <File path> -User: <Domain>\\<User> -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -Signature Version: <Definition version> -Engine Version: <Antimalware Engine version> -Event ID: 1011 -Symbolic name: - -**MALWAREPROTECTION\_QUARANTINE\_DELETE** - -Message: - -**The antimalware platform deleted an item from quarantine.** - -Description: - -Windows Defender has deleted an item from quarantine. For more information please see the following: - -Name: <Threat name> -ID: <Threat ID> -Severity: <Severity>, for example: -- Low -- Moderate -- High -- Severe - -Category: <Category description>, for example, any threat or malware type. -Path: <File path> -User: <Domain>\\<User> -Signature Version: <Definition version> -Engine Version: <Antimalware Engine version> -Event ID: 1012 -Symbolic name: - -**MALWAREPROTECTION\_QUARANTINE\_DELETE\_FAILED** - -Message: - -**The antimalware platform could not delete an item from quarantine.** - -Description: - -Windows Defender has encountered an error trying to delete an item from quarantine. For more information please see the following: - -Name: <Threat name> -ID: <Threat ID> -Severity: <Severity>, for example: -- Low -- Moderate -- High -- Severe - -Category: <Category description>, for example, any threat or malware type. -Path: <File path> -User: <Domain>\\<User> -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -Signature Version: <Definition version> -Engine Version: <Antimalware Engine version> -Event ID: 1013 -Symbolic name: - -**MALWAREPROTECTION\_MALWARE\_HISTORY\_DELETE** - -Message: - -**The antimalware platform deleted history of malware and other potentially unwanted software.** - -Description: - -Windows Defender has removed history of malware and other potentially unwanted software. - -Time: The time when the event occurred, for example when the history is purged. Note that this parameter is not used in threat events so that there is no confusion regarding whether it is remediation time or infection time. For those, we specifically call them as Action Time or Detection Time. -User: <Domain>\\<User> -Event ID: 1014 -Symbolic name: - -**MALWAREPROTECTION\_MALWARE\_HISTORY\_DELETE\_FAILED** - -Message: - -The antimalware platform could not delete history of malware and other potentially unwanted software. - -Description: - -Windows Defender has encountered an error trying to remove history of malware and other potentially unwanted software. - -Time: The time when the event occurred, for example when the history is purged. Note that this parameter is not used in threat events so that there is no confusion regarding whether it is remediation time or infection time. For those, we specifically call them as Action Time or Detection Time. -User: <Domain>\\<User> -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -Event ID: 1015 -Symbolic name: - -**MALWAREPROTECTION\_BEHAVIOR\_DETECTED** - -Message: - -**The antimalware platform detected suspicious behavior.** - -Description: - -Windows Defender has detected a suspicious behavior. For more information please see the following: - -Name: <Threat name> -ID: <Threat ID> -Severity: <Severity>, for example: -- Low -- Moderate -- High -- Severe - -Category: <Category description>, for example, any threat or malware type. -Path: <File path> -Detection Origin: <Detection origin>, for example: -- Unknown -- Local computer -- Network share -- Internet -- Incoming traffic -- Outgoing traffic - -Detection Type: <Detection type>, for example: -- Heuristics -- Generic -- Concrete -- Dynamic signature - -Detection Source: <Detection source> for example: -- User: user initiated -- System: system initiated -- Real-time: real-time component initiated -- IOAV: IE Downloads and Outlook Express Attachments initiated -- NIS: Network inspection system -- IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls -- Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence -- Remote attestation - -Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. UAC -Status: <Status> -User: <Domain>\\<User> -Process Name: <Process in the PID> -Signature ID: Enumeration matching severity. -Signature Version: <Definition version> -Engine Version: <Antimalware Engine version> -Fidelity Label: -Target File Name: <File name> Name of the file. -Event ID: 1116 -Symbolic name: - -**MALWAREPROTECTION\_STATE\_MALWARE\_DETECTED** - -Message: - -**The antimalware platform detected malware or other potentially unwanted software.** - -Description: - -Windows Defender has detected malware or other potentially unwanted software. For more information please see the following: - -Name: <Threat name> -ID: <Threat ID> -Severity: <Severity>, for example: -- Low -- Moderate -- High -- Severe - -Category: <Category description>, for example, any threat or malware type. -Path: <File path> -Detection Origin: <Detection origin>, for example: -- Unknown -- Local computer -- Network share -- Internet -- Incoming traffic -- Outgoing traffic - -Detection Type: <Detection type>, for example: -- Heuristics -- Generic -- Concrete -- Dynamic signature - -Detection Source: <Detection source> for example: -- User: user initiated -- System: system initiated -- Real-time: real-time component initiated -- IOAV: IE Downloads and Outlook Express Attachments initiated -- NIS: Network inspection system -- IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls -- Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence -- Remote attestation - -Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. UAC -User: <Domain>\\<User> -Process Name: <Process in the PID> -Signature Version: <Definition version> -Engine Version: <Antimalware Engine version> -User action: - -No action is required. Windows Defender can suspend and take routine action on this threat. If you want to remove the threat manually, in the Windows Defender interface, click **Clean Computer**. - -Event ID: 1117 -Symbolic name: - -**MALWAREPROTECTION\_STATE\_MALWARE\_ACTION\_TAKEN** - -Message: - -**The antimalware platform performed an action to protect your system from malware or other potentially unwanted software.** - -Description: - -Windows Defender has taken action to protect this machine from malware or other potentially unwanted software. For more information please see the following: - -Name: <Threat name> -ID: <Threat ID> -Severity: <Severity>, for example: -- Low -- Moderate -- High -- Severe - -Category: <Category description>, for example, any threat or malware type. -Path: <File path> -Detection Origin: <Detection origin>, for example: -- Unknown -- Local computer -- Network share -- Internet -- Incoming traffic -- Outgoing traffic - -Detection Type: <Detection type>, for example: -- Heuristics -- Generic -- Concrete -- Dynamic signature - -Detection Source: <Detection source> for example: -- User: user initiated -- System: system initiated -- Real-time: real-time component initiated -- IOAV: IE Downloads and Outlook Express Attachments initiated -- NIS: Network inspection system -- IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls -- Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence -- Remote attestation - -Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. UAC -User: <Domain>\\<User> -Process Name: <Process in the PID> -Action: <Action>, for example: -- Clean: The resource was cleaned -- Quarantine: The resource was quarantined -- Remove: The resource was deleted -- Allow: The resource was allowed to execute/exist -- User defined: User defined action which is normally one from this list of actions that the user has specified -- No action: No action -- Block: The resource was blocked from executing - -Action Status: <Description of additional actions> -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -Signature Version: <Definition version> -Engine Version: <Antimalware Engine version> -User action: - -No action is necessary. Windows Defender removed or quarantined a threat. - -Event ID: 1118 -Symbolic name: - -**MALWAREPROTECTION\_STATE\_MALWARE\_ACTION\_FAILED** - -Message: - -**The antimalware platform attempted to perform an action to protect your system from malware or other potentially unwanted software, but the action failed.** - -Description: - -Windows Defender has encountered a non-critical error when taking action on malware or other potentially unwanted software. For more information please see the following: - -Name: <Threat name> -ID: <Threat ID> -Severity: <Severity>, for example: -- Low -- Moderate -- High -- Severe - -Category: <Category description>, for example, any threat or malware type. -Path: <File path> -Detection Origin: <Detection origin>, for example: -- Unknown -- Local computer -- Network share -- Internet -- Incoming traffic -- Outgoing traffic - -Detection Type: <Detection type>, for example: -- Heuristics -- Generic -- Concrete -- Dynamic signature - -Detection Source: <Detection source> for example: -- User: user initiated -- System: system initiated -- Real-time: real-time component initiated -- IOAV: IE Downloads and Outlook Express Attachments initiated -- NIS: Network inspection system -- IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls -- Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence -- Remote attestation - -Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. UAC -User: <Domain>\\<User> -Process Name: <Process in the PID> -Action: <Action>, for example: -- Clean: The resource was cleaned -- Quarantine: The resource was quarantined -- Remove: The resource was deleted -- Allow: The resource was allowed to execute/exist -- User defined: User defined action which is normally one from this list of actions that the user has specified -- No action: No action -- Block: The resource was blocked from executing - -Action Status: <Description of additional actions> -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -Signature Version: <Definition version> -Engine Version: <Antimalware Engine version> -User action: - -No action is necessary. Windows Defender failed to complete a task related to the malware remediation. This is not a critical failure. - -Event ID: 1119 -Symbolic name: - -**MALWAREPROTECTION\_STATE\_MALWARE\_ACTION\_CRITICALLY\_FAILED** - -Message: - -**The antimalware platform encountered a critical error when trying to take action on malware or other potentially unwanted software. There are more details in the event message.** - -Description: - -Windows Defender has encountered a critical error when taking action on malware or other potentially unwanted software. For more information please see the following: - -Name: <Threat name> -ID: <Threat ID> -Severity: <Severity>, for example: -- Low -- Moderate -- High -- Severe - -Category: <Category description>, for example, any threat or malware type. -Path: <File path> -Detection Origin: <Detection origin>, for example: -- Unknown -- Local computer -- Network share -- Internet -- Incoming traffic -- Outgoing traffic - -Detection Type: <Detection type>, for example: -- Heuristics -- Generic -- Concrete -- Dynamic signature - -Detection Source: <Detection source> for example: -- User: user initiated -- System: system initiated -- Real-time: real-time component initiated -- IOAV: IE Downloads and Outlook Express Attachments initiated -- NIS: Network inspection system -- IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls -- Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence -- Remote attestation - -Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. UAC -User: <Domain>\\<User> -Process Name: <Process in the PID> -Action: <Action>, for example: -- Clean: The resource was cleaned -- Quarantine: The resource was quarantined -- Remove: The resource was deleted -- Allow: The resource was allowed to execute/exist -- User defined: User defined action which is normally one from this list of actions that the user has specified -- No action: No action -- Block: The resource was blocked from executing - -Action Status: <Description of additional actions> -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -Signature Version: <Definition version> -Engine Version: <Antimalware Engine version> -User action: - -The Windows Defender client encountered this error due to critical issues. The endpoint might not be protected. Review the error description then follow the relevant **User action** steps below. - ---- - - - - + + + + - - - - - + + + - - - + + + - - - + + + + - - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + -
ActionUser action
Event ID: 1000 +

Symbolic name:

+
+

MALWAREPROTECTION_SCAN_STARTED

+

Remove

Update the definitions then verify that the removal was successful.

+

Message:

+
+

An antimalware scan started. +

+

Clean

Update the definitions then verify that the remediation was successful.

+

Description:

+
+

+

+
Scan ID: <ID number of the relevant scan.>
+
Scan Type: <Scan type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
+
+
Scan Parameters: <Scan parameters>, for example:
    +
  • Full scan
  • +
  • Quick scan
  • +
  • Customer scan
  • +
+
+
Scan Resources: <Resources (such as files/directories/BHO) that were scanned.>
+
User: <Domain>\<User>
+
+

+

Quarantine

Update the definitions and verify that the user has permission to access the necessary resources.

Event ID: 1001 +

Symbolic name:

+
+

MALWAREPROTECTION_SCAN_COMPLETED

+

Allow

Verify that the user has permission to access the necessary resources.

+

Message:

+
+

An antimalware scan finished.

+
+

Description:

+
+

+

+
Scan ID: <ID number of the relevant scan.>
+
Scan Type: <Scan type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
+
+
Scan Parameters: <Scan parameters>, for example:
    +
  • Full scan
  • +
  • Quick scan
  • +
  • Customer scan
  • +
+
+
User: <Domain>\<User>
+
Scan Time: <The duration of a scan.>
+
+

+
Event ID: 1002 +

Symbolic name:

+
+

MALWAREPROTECTION_SCAN_CANCELLED +

+
+

Message:

+
+

An antimalware scan was stopped before it finished. +

+
+

Description:

+
+

+

+
Scan ID: <ID number of the relevant scan.>
+
Scan Type: <Scan type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
+
+
Scan Parameters: <Scan parameters>, for example:
    +
  • Full scan
  • +
  • Quick scan
  • +
  • Customer scan
  • +
+
+
User: <Domain>\<User>
+
Scan Time: <The duration of a scan.>
+
+

+
Event ID: 1003 +

Symbolic name:

+
+

MALWAREPROTECTION_SCAN_PAUSED +

+
+

Message:

+
+

An antimalware scan was paused. +

+
+

Description:

+
+

+

+
Scan ID: <ID number of the relevant scan.>
+
Scan Type: <Scan type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
+
+
Scan Parameters: <Scan parameters>, for example:
    +
  • Full scan
  • +
  • Quick scan
  • +
  • Customer scan
  • +
+
+
User: <Domain>\<User>
+
+

+
Event ID: 1004 +

Symbolic name:

+
+

MALWAREPROTECTION_SCAN_RESUMED +

+
+

Message:

+
+

An antimalware scan was resumed. +

+
+

Description:

+
+

+

+
Scan ID: <ID number of the relevant scan.>
+
Scan Type: <Scan type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
+
+
Scan Parameters: <Scan parameters>, for example:
    +
  • Full scan
  • +
  • Quick scan
  • +
  • Customer scan
  • +
+
+
User: <Domain>\<User>
+
+

+
Event ID: 1005 +

Symbolic name:

+
+

MALWAREPROTECTION_SCAN_FAILED +

+
+

Message:

+
+

An antimalware scan failed. +

+
+

Description:

+
+

+

+
Scan ID: <ID number of the relevant scan.>
+
Scan Type: <Scan type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
+
+
Scan Parameters: <Scan parameters>, for example:
    +
  • Full scan
  • +
  • Quick scan
  • +
  • Customer scan
  • +
+
+
User: <Domain>\<User>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
+

+
+

User action:

+
+

The Windows Defender client encountered an error, and the current scan has stopped. The scan might fail due to a client-side issue. This event record includes the scan ID, type of scan (antivirus, antispyware, antimalware), scan parameters, the user that started the scan, the error code, and a description of the error. + +

+

To troubleshoot this event: +

    +
  1. Run the scan again.
  2. +
  3. If it fails in the same way, go to the Microsoft Support site, enter the error number in the Search box to look for the error code.
  4. +
  5. Contact Microsoft Technical Support. +
  6. +
+

+
Event ID: 1006 +

Symbolic name:

+
+

MALWAREPROTECTION_MALWARE_DETECTED +

+
+

Message:

+
+

The antimalware engine found malware or other potentially unwanted software. +

+
+

Description:

+
+

+

For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
Detection Origin: <Detection origin>, for example:
    +
  • Unknown
  • +
  • Local computer
  • +
  • Network share
  • +
  • Internet
  • +
  • Incoming traffic
  • +
  • Outgoing traffic
  • +
+
+
Detection Type: <Detection type>, for example:
    +
  • Heuristics
  • +
  • Generic
  • +
  • Concrete
  • +
  • Dynamic signature
  • +
+
+
Detection Source: <Detection source> for example:
    +
  • User: user initiated
  • +
  • System: system initiated
  • +
  • Real-time: real-time component initiated
  • +
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • +
  • NIS: Network inspection system
  • +
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • +
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • +
  • Remote attestation
  • +
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. +UAC
+
Status: <Status>
+
User: <Domain>\<User>
+
Process Name: <Process in the PID>
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
Event ID: 1007 +

Symbolic name:

+
+

MALWAREPROTECTION_MALWARE_ACTION_TAKEN +

+
+

Message:

+
+

The antimalware platform performed an action to protect your system from malware or other potentially unwanted software. +

+
+

Description:

+
+

+

Windows Defender has taken action to protect this machine from malware or other potentially unwanted software. For more information please see the following:

+
+
User: <Domain>\<User>
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Action: <Action>, for example:
    +
  • Clean: The resource was cleaned
  • +
  • Quarantine: The resource was quarantined
  • +
  • Remove: The resource was deleted
  • +
  • Allow: The resource was allowed to execute/exist
  • +
  • User defined: User defined action which is normally one from this list of actions that the user has specified
  • +
  • No action: No action
  • +
  • Block: The resource was blocked from executing
  • +
+
+
Status: <Status>
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
Event ID: 1008 +

Symbolic name:

+
+

MALWAREPROTECTION_MALWARE_ACTION_FAILED

+
+

Message:

+
+

The antimalware platform attempted to perform an action to protect your system from malware or other potentially unwanted software, but the action failed.

+
+

Description:

+
+

+

Windows Defender has encountered an error when taking action on malware or other potentially unwanted software. For more information please see the following:

+
+
User: <Domain>\<User>
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
Action: <Action>, for example:
    +
  • Clean: The resource was cleaned
  • +
  • Quarantine: The resource was quarantined
  • +
  • Remove: The resource was deleted
  • +
  • Allow: The resource was allowed to execute/exist
  • +
  • User defined: User defined action which is normally one from this list of actions that the user has specified
  • +
  • No action: No action
  • +
  • Block: The resource was blocked from executing
  • +
+
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Status: <Status>
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
Event ID: 1009 +

Symbolic name:

+
+

MALWAREPROTECTION_QUARANTINE_RESTORE +

+
+

Message:

+
+

The antimalware platform restored an item from quarantine. +

+
+

Description:

+
+

+

Windows Defender has restored an item from quarantine. For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
User: <Domain>\<User>
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
Event ID: 1010 +

Symbolic name:

+
+

MALWAREPROTECTION_QUARANTINE_RESTORE_FAILED +

+
+

Message:

+
+

The antimalware platform could not restore an item from quarantine. +

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to restore an item from quarantine. For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
User: <Domain>\<User>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
Event ID: 1011 +

Symbolic name:

+
+

MALWAREPROTECTION_QUARANTINE_DELETE

+
+

Message:

+
+

The antimalware platform deleted an item from quarantine. +

+
+

Description:

+
+

+

Windows Defender has deleted an item from quarantine. +For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
User: <Domain>\<User>
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
Event ID: 1012 +

Symbolic name:

+
+

MALWAREPROTECTION_QUARANTINE_DELETE_FAILED +

+
+

Message:

+
+

The antimalware platform could not delete an item from quarantine.

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to delete an item from quarantine. +For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
User: <Domain>\<User>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
Event ID: 1013 +

Symbolic name:

+
+

MALWAREPROTECTION_MALWARE_HISTORY_DELETE +

+
+

Message:

+
+

The antimalware platform deleted history of malware and other potentially unwanted software.

+
+

Description:

+
+

+

Windows Defender has removed history of malware and other potentially unwanted software.

+
+
Time: The time when the event occurred, for example when the history is purged. Note that this parameter is not used in threat events so that there is no confusion regarding whether it is remediation time or infection time. For those, we specifically call them as Action Time or Detection Time.
+
User: <Domain>\<User>
+
+

+
Event ID: 1014 +

Symbolic name:

+
+

MALWAREPROTECTION_MALWARE_HISTORY_DELETE_FAILED +

+
+

Message:

+
+

The antimalware platform could not delete history of malware and other potentially unwanted software.

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to remove history of malware and other potentially unwanted software.

+
+
Time: The time when the event occurred, for example when the history is purged. Note that this parameter is not used in threat events so that there is no confusion regarding whether it is remediation time or infection time. For those, we specifically call them as Action Time or Detection Time.
+
User: <Domain>\<User>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
+

+
Event ID: 1015 +

Symbolic name:

+
+

MALWAREPROTECTION_BEHAVIOR_DETECTED +

+
+

Message:

+
+

The antimalware platform detected suspicious behavior.

+
+

Description:

+
+

+

Windows Defender has detected a suspicious behavior. +For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
Detection Origin: <Detection origin>, for example: +
    +
  • Unknown
  • +
  • Local computer
  • +
  • Network share
  • +
  • Internet
  • +
  • Incoming traffic
  • +
  • Outgoing traffic
  • +
+
+
Detection Type: <Detection type>, for example:
    +
  • Heuristics
  • +
  • Generic
  • +
  • Concrete
  • +
  • Dynamic signature
  • +
+
+
Detection Source: <Detection source> for example:
    +
  • User: user initiated
  • +
  • System: system initiated
  • +
  • Real-time: real-time component initiated
  • +
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • +
  • NIS: Network inspection system
  • +
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • +
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • +
  • Remote attestation
  • +
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. +UAC
+
Status: <Status>
+
User: <Domain>\<User>
+
Process Name: <Process in the PID>
+
Signature ID: Enumeration matching severity.
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
Fidelity Label:
+
Target File Name: <File name> +Name of the file.
+
+

+
Event ID: 1116 +

Symbolic name:

+
+

MALWAREPROTECTION_STATE_MALWARE_DETECTED

+
+

Message:

+
+

The antimalware platform detected malware or other potentially unwanted software. +

+
+

Description:

+
+

+

Windows Defender has detected malware or other potentially unwanted software. +For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
Detection Origin: <Detection origin>, for example: +
    +
  • Unknown
  • +
  • Local computer
  • +
  • Network share
  • +
  • Internet
  • +
  • Incoming traffic
  • +
  • Outgoing traffic
  • +
+
+
Detection Type: <Detection type>, for example:
    +
  • Heuristics
  • +
  • Generic
  • +
  • Concrete
  • +
  • Dynamic signature
  • +
+
+
Detection Source: <Detection source> for example:
    +
  • User: user initiated
  • +
  • System: system initiated
  • +
  • Real-time: real-time component initiated
  • +
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • +
  • NIS: Network inspection system
  • +
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • +
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • +
  • Remote attestation
  • +
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. +UAC
+
User: <Domain>\<User>
+
Process Name: <Process in the PID>
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
+

User action:

+
+

No action is required. Windows Defender can suspend and take routine action on this threat. If you want to remove the threat manually, in the Windows Defender interface, click Clean Computer.

+
Event ID: 1117 +

Symbolic name:

+
+

MALWAREPROTECTION_STATE_MALWARE_ACTION_TAKEN +

+
+

Message:

+
+

The antimalware platform performed an action to protect your system from malware or other potentially unwanted software. +

+
+

Description:

+
+

+

Windows Defender has taken action to protect this machine from malware or other potentially unwanted software. +For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
Detection Origin: <Detection origin>, for example: +
    +
  • Unknown
  • +
  • Local computer
  • +
  • Network share
  • +
  • Internet
  • +
  • Incoming traffic
  • +
  • Outgoing traffic
  • +
+
+
Detection Type: <Detection type>, for example:
    +
  • Heuristics
  • +
  • Generic
  • +
  • Concrete
  • +
  • Dynamic signature
  • +
+
+
Detection Source: <Detection source> for example:
    +
  • User: user initiated
  • +
  • System: system initiated
  • +
  • Real-time: real-time component initiated
  • +
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • +
  • NIS: Network inspection system
  • +
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • +
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • +
  • Remote attestation
  • +
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. +UAC
+
User: <Domain>\<User>
+
Process Name: <Process in the PID>
+
Action: <Action>, for example:
    +
  • Clean: The resource was cleaned
  • +
  • Quarantine: The resource was quarantined
  • +
  • Remove: The resource was deleted
  • +
  • Allow: The resource was allowed to execute/exist
  • +
  • User defined: User defined action which is normally one from this list of actions that the user has specified
  • +
  • No action: No action
  • +
  • Block: The resource was blocked from executing
  • +
+
+
Action Status: <Description of additional actions>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
+

User action:

+
+

No action is necessary. Windows Defender removed or quarantined a threat.

+
Event ID: 1118 +

Symbolic name:

+
+

MALWAREPROTECTION_STATE_MALWARE_ACTION_FAILED

+
+

Message:

+
+

The antimalware platform attempted to perform an action to protect your system from malware or other potentially unwanted software, but the action failed. +

+
+

Description:

+
+

+

Windows Defender has encountered a non-critical error when taking action on malware or other potentially unwanted software. +For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
Detection Origin: <Detection origin>, for example: +
    +
  • Unknown
  • +
  • Local computer
  • +
  • Network share
  • +
  • Internet
  • +
  • Incoming traffic
  • +
  • Outgoing traffic
  • +
+
+
Detection Type: <Detection type>, for example:
    +
  • Heuristics
  • +
  • Generic
  • +
  • Concrete
  • +
  • Dynamic signature
  • +
+
+
Detection Source: <Detection source> for example:
    +
  • User: user initiated
  • +
  • System: system initiated
  • +
  • Real-time: real-time component initiated
  • +
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • +
  • NIS: Network inspection system
  • +
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • +
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • +
  • Remote attestation
  • +
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. +UAC
+
User: <Domain>\<User>
+
Process Name: <Process in the PID>
+
Action: <Action>, for example:
    +
  • Clean: The resource was cleaned
  • +
  • Quarantine: The resource was quarantined
  • +
  • Remove: The resource was deleted
  • +
  • Allow: The resource was allowed to execute/exist
  • +
  • User defined: User defined action which is normally one from this list of actions that the user has specified
  • +
  • No action: No action
  • +
  • Block: The resource was blocked from executing
  • +
+
+
Action Status: <Description of additional actions>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
+

User action:

+
+

No action is necessary. Windows Defender failed to complete a task related to the malware remediation. This is not a critical failure.

+
Event ID: 1119 +

Symbolic name:

+
+

MALWAREPROTECTION_STATE_MALWARE_ACTION_CRITICALLY_FAILED +

+
+

Message:

+
+

The antimalware platform encountered a critical error when trying to take action on malware or other potentially unwanted software. There are more details in the event message.

+
+

Description:

+
+

+

Windows Defender has encountered a critical error when taking action on malware or other potentially unwanted software. +For more information please see the following:

+
+
Name: <Threat name>
+
ID: <Threat ID>
+
Severity: <Severity>, for example:
    +
  • Low
  • +
  • Moderate
  • +
  • High
  • +
  • Severe
  • +
+
+
Category: <Category description>, for example, any threat or malware type.
+
Path: <File path>
+
Detection Origin: <Detection origin>, for example: +
    +
  • Unknown
  • +
  • Local computer
  • +
  • Network share
  • +
  • Internet
  • +
  • Incoming traffic
  • +
  • Outgoing traffic
  • +
+
+
Detection Type: <Detection type>, for example:
    +
  • Heuristics
  • +
  • Generic
  • +
  • Concrete
  • +
  • Dynamic signature
  • +
+
+
Detection Source: <Detection source> for example:
    +
  • User: user initiated
  • +
  • System: system initiated
  • +
  • Real-time: real-time component initiated
  • +
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • +
  • NIS: Network inspection system
  • +
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • +
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • +
  • Remote attestation
  • +
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. +UAC
+
User: <Domain>\<User>
+
Process Name: <Process in the PID>
+
Action: <Action>, for example:
    +
  • Clean: The resource was cleaned
  • +
  • Quarantine: The resource was quarantined
  • +
  • Remove: The resource was deleted
  • +
  • Allow: The resource was allowed to execute/exist
  • +
  • User defined: User defined action which is normally one from this list of actions that the user has specified
  • +
  • No action: No action
  • +
  • Block: The resource was blocked from executing
  • +
+
+
Action Status: <Description of additional actions>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
+

User action:

+
+

The Windows Defender client encountered this error due to critical issues. The endpoint might not be protected. Review the error description then follow the relevant User action steps below.

+ + + + + + + + + + + + + + + + + + + + + +
ActionUser action
+

Remove

+
+

Update the definitions then verify that the removal was successful.

+
+

Clean

+
+

Update the definitions then verify that the remediation was successful.

+
+

Quarantine

+
+

Update the definitions and verify that the user has permission to access the necessary resources.

+
+

Allow

+
+

Verify that the user has permission to access the necessary resources.

+
+

 

+

If this event persists:

    +
  1. Run the scan again.
  2. +
  3. If it fails in the same way, go to the Microsoft Support site, enter the error number in the Search box to look for the error code.
  4. +
  5. Contact Microsoft Technical Support. +
  6. +
+

+
Event ID: 1120 +

Symbolic name:

+
+

MALWAREPROTECTION_THREAT_HASH

+
+

Message:

+
+

Windows Defender has deduced the hashes for a threat resource.

+
+

Description:

+
+

+

Windows Defender client is up and running in a healthy state.

+
+
Current Platform Version: <Current platform version>
+
Threat Resource Path: <Path>
+
Hashes: <Hashes>
+
+

+
+
Note  This event will only be logged if the following policy is set: ThreatFileHashLogging unsigned.
+
 
+
Event ID: 1150 +

Symbolic name:

+
+

MALWAREPROTECTION_SERVICE_HEALTHY

+
+

Message:

+
+

If your antimalware platform reports status to a monitoring platform, this event indicates that the antimalware platform is running and in a healthy state. +

+
+

Description:

+
+

+

Windows Defender client is up and running in a healthy state.

+
+
Platform Version: <Current platform version>
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware Engine version>
+
+

+
+

User action:

+
+

No action is necessary. The Windows Defenderclient is in a healthy state. This event is reported on an hourly basis.

+
Event ID: 2000 +

Symbolic name:

+
+

MALWAREPROTECTION_SIGNATURE_UPDATED +

+
+

Message:

+
+

The antimalware definitions updated successfully. +

+
+

Description:

+
+

+

Windows Defender signature version has been updated.

+
+
Current Signature Version: <Current signature version>
+
Previous Signature Version: <Previous signature version>
+
Signature Type: <Signature type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
  • Network Inspection System
  • +
+
+
Update Type: <Update type>, either Full or Delta.
+
User: <Domain>\<User>
+
Current Engine Version: <Current engine version>
+
Previous Engine Version: <Previous engine version>
+
+

+
+

User action:

+
+

No action is necessary. The Windows Defender client is in a healthy state. This event is reported when signatures are successfully updated.

+
Event ID: 2001 +

Symbolic name:

+
+

MALWAREPROTECTION_SIGNATURE_UPDATE_FAILED

+
+

Message:

+
+

The antimalware definition update failed. +

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to update signatures.

+
+
New Signature Version: <New version number>
+
Previous Signature Version: <Previous signature version>
+
Update Source: <Update source>, for example: +
    +
  • Signature update folder
  • +
  • Internal definition update server
  • +
  • Microsoft Update Server
  • +
  • File share
  • +
  • Microsoft Malware Protection Center (MMPC)
  • +
+
+
Update Stage: <Update stage>, for example: +
    +
  • Search
  • +
  • Download
  • +
  • Install
  • +
+
+
Source Path: File share name for Universal Naming Convention (UNC), server name for Windows Server Update Services (WSUS)/Microsoft Update/ADL.
+
Signature Type: <Signature type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
  • Network Inspection System
  • +
+
+
Update Type: <Update type>, either Full or Delta.
+
User: <Domain>\<User>
+
Current Engine Version: <Current engine version>
+
Previous Engine Version: <Previous engine version>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
+

+
+

User action:

+
+

This error occurs when there is a problem updating definitions.

+

To troubleshoot this event: +

    +
  1. Update the definitions. Either:
      +
    1. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows Defender

      Or,

      +
    2. +
    3. Download the latest definitions from the Microsoft Malware Protection Center. + +

      Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

      +
    4. +
    +
  2. +
  3. Review the entries in the %Windir%\WindowsUpdate.log file for more information about this error.
  4. +
  5. Contact Microsoft Technical Support. +
  6. +
+

+
Event ID: 2002 +

Symbolic name:

+
+

MALWAREPROTECTION_ENGINE_UPDATED

+
+

Message:

+
+

The antimalware engine updated successfully. +

+
+

Description:

+
+

+

Windows Defender engine version has been updated.

+
+
Current Engine Version: <Current engine version>
+
Previous Engine Version: <Previous engine version>
+
Engine Type: <Engine type>, either antimalware engine or Network Inspection System engine.
+
User: <Domain>\<User>
+
+

+
+

User action:

+
+

No action is necessary. The Windows Defender client is in a healthy state. This event is reported when the antimalware engine is successfully updated.

+
Event ID: 2003 +

Symbolic name:

+
+

MALWAREPROTECTION_ENGINE_UPDATE_FAILED

+
+

Message:

+
+

The antimalware engine update failed. +

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to update the engine.

+
+
New Engine Version:
+
Previous Engine Version: <Previous engine version>
+
Engine Type: <Engine type>, either antimalware engine or Network Inspection System engine.
+
User: <Domain>\<User>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
+

+
+

User action:

+
+

The Windows Defender client update failed. This event occurs when the client fails to update itself. This event is usually due to an interruption in network connectivity during an update.

+

To troubleshoot this event: +

    +
  1. Update the definitions. Either:
      +
    1. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows Defender

      Or,

      +
    2. +
    3. Download the latest definitions from the Microsoft Malware Protection Center. + +

      Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

      +
    4. +
    +
  2. +
  3. Contact Microsoft Technical Support. +
  4. +
+

+
Event ID: 2004 +

Symbolic name:

+
+

MALWAREPROTECTION_SIGNATURE_REVERSION

+
+

Message:

+
+

There was a problem loading antimalware definitions. The antimalware engine will attempt to load the last-known good set of definitions.

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to load signatures and will attempt reverting back to a known-good set of signatures.

+
+
Signatures Attempted:
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Signature Version: <Definition version>
+
Engine Version: <Antimalware engine version>
+
+

+
+

User action:

+
+

The Windows Defender client attempted to download and install the latest definitions file and failed. This error can occur when the client encounters an error while trying to load the definitions, or if the file is corrupt. Windows Defender will attempt to revert back to a known-good set of definitions.

+

To troubleshoot this event: +

    +
  1. Restart the computer and try again.
  2. +
  3. Download the latest definitions from the Microsoft Malware Protection Center. + +

    Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

    +
  4. +
  5. Contact Microsoft Technical Support. +
  6. +
+

+
Event ID: 2005 +

Symbolic name:

+
+

MALWAREPROTECTION_ENGINE_UPDATE_PLATFORMOUTOFDATE

+
+

Message:

+
+

The antimalware engine failed to load because the antimalware platform is out of date. The antimalware platform will load the last-known good antimalware engine and attempt to update.

+
+

Description:

+
+

+

Windows Defender could not load antimalware engine because current platform version is not supported. Windows Defender will revert back to the last known-good engine and a platform update will be attempted.

+
+
Current Platform Version: <Current platform version>
+
+

+
Event ID: 2006 +

Symbolic name:

+
+

MALWAREPROTECTION_PLATFORM_UPDATE_FAILED +

+
+

Message:

+
+

The platform update failed. +

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to update the platform.

+
+
Current Platform Version: <Current platform version>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
+

+
Event ID: 2007 +

Symbolic name:

+
+

MALWAREPROTECTION_PLATFORM_ALMOSTOUTOFDATE

+
+

Message:

+
+

The platform will soon be out of date. Download the latest platform to maintain up-to-date protection.

+
+

Description:

+
+

+

Windows Defender will soon require a newer platform version to support future versions of the antimalware engine. Download the latest Windows Defender platform to maintain the best level of protection available.

+
+
Current Platform Version: <Current platform version>
+
+

+
Event ID: 2010 +

Symbolic name:

+
+

MALWAREPROTECTION_SIGNATURE_FASTPATH_UPDATED +

+
+

Message:

+
+

The antimalware engine used the Dynamic Signature Service to get additional definitions. +

+
+

Description:

+
+

+

Windows Defender used Dynamic Signature Service to retrieve additional signatures to help protect your machine.

+
+
Current Signature Version: <Current signature version>
+
Signature Type: <Signature type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
  • Network Inspection System
  • +
+
+
Current Engine Version: <Current engine version>
+
Dynamic Signature Type: <Dynamic signature type>, for example: +
    +
  • Version
  • +
  • Timestamp
  • +
  • No limit
  • +
  • Duration
  • +
+
+
Persistence Path: <Path>
+
Dynamic Signature Version: <Version number>
+
Dynamic Signature Compilation Timestamp: <Timestamp>
+
Persistence Limit Type: <Persistence limit type>, for example: +
    +
  • VDM version
  • +
  • Timestamp
  • +
  • No limit
  • +
+
+
Persistence Limit: Persistence limit of the fastpath signature.
+
+

+
Event ID: 2011 +

Symbolic name:

+
+

MALWAREPROTECTION_SIGNATURE_FASTPATH_DELETED +

+
+

Message:

+
+

The Dynamic Signature Service deleted the out-of-date dynamic definitions. +

+
+

Description:

+
+

+

Windows Defender used Dynamic Signature Service to discard obsolete signatures.

+
+
Current Signature Version: <Current signature version>
+
Signature Type: <Signature type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
  • Network Inspection System
  • +
+
+
Current Engine Version: <Current engine version>
+
Dynamic Signature Type: <Dynamic signature type>, for example: +
    +
  • Version
  • +
  • Timestamp
  • +
  • No limit
  • +
  • Duration
  • +
+
+
Persistence Path: <Path>
+
Dynamic Signature Version: <Version number>
+
Dynamic Signature Compilation Timestamp: <Timestamp>
+
Removal Reason:
+
Persistence Limit Type: <Persistence limit type>, for example: +
    +
  • VDM version
  • +
  • Timestamp
  • +
  • No limit
  • +
+
+
Persistence Limit: Persistence limit of the fastpath signature.
+
+

+
+

User action:

+
+

No action is necessary. The Windows Defender client is in a healthy state. This event is reported when the Dynamic Signature Service successfully deletes out-of-date dynamic definitions.

+
Event ID: 2012 +

Symbolic name:

+
+

MALWAREPROTECTION_SIGNATURE_FASTPATH_UPDATE_FAILED +

+
+

Message:

+
+

The antimalware engine encountered an error when trying to use the Dynamic Signature Service. +

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to use Dynamic Signature Service.

+
+
Current Signature Version: <Current signature version>
+
Signature Type: <Signature type>, for example:
    +
  • Antivirus
  • +
  • Antispyware
  • +
  • Antimalware
  • +
  • Network Inspection System
  • +
+
+
Current Engine Version: <Current engine version>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Dynamic Signature Type: <Dynamic signature type>, for example: +
    +
  • Version
  • +
  • Timestamp
  • +
  • No limit
  • +
  • Duration
  • +
+
+
Persistence Path: <Path>
+
Dynamic Signature Version: <Version number>
+
Dynamic Signature Compilation Timestamp: <Timestamp>
+
Persistence Limit Type: <Persistence limit type>, for example: +
    +
  • VDM version
  • +
  • Timestamp
  • +
  • No limit
  • +
+
+
Persistence Limit: Persistence limit of the fastpath signature.
+
+

+
+

User action:

+
+

Check your Internet connectivity settings.

+
Event ID: 2013 +

Symbolic name:

+
+

MALWAREPROTECTION_SIGNATURE_FASTPATH_DELETED_ALL +

+
+

Message:

+
+

The Dynamic Signature Service deleted all dynamic definitions. +

+
+

Description:

+
+

+

Windows Defender discarded all Dynamic Signature Service signatures.

+
+
Current Signature Version: <Current signature version>
+
+

+
Event ID: 2020 +

Symbolic name:

+
+

MALWAREPROTECTION_CLOUD_CLEAN_RESTORE_FILE_DOWNLOADED +

+
+

Message:

+
+

The antimalware engine downloaded a clean file. +

+
+

Description:

+
+

+

Windows Defender downloaded a clean file.

+
+
Filename: <File name> +Name of the file.
+
Current Signature Version: <Current signature version>
+
Current Engine Version: <Current engine version>
+
+

+
Event ID: 2021 +

Symbolic name:

+
+

MALWAREPROTECTION_CLOUD_CLEAN_RESTORE_FILE_DOWNLOAD_FAILED

+
+

Message:

+
+

The antimalware engine failed to download a clean file. +

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to download a clean file.

+
+
Filename: <File name> +Name of the file.
+
Current Signature Version: <Current signature version>
+
Current Engine Version: <Current engine version>
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
+

+
+

User action:

+
+

Check your Internet connectivity settings. +

+

The Windows Defender client encountered an error when using the Dynamic Signature Service to download the latest definitions to a specific threat. This error is likely caused by a network connectivity issue. +

+
Event ID: 2030 +

Symbolic name:

+
+

MALWAREPROTECTION_OFFLINE_SCAN_INSTALLED

+
+

Message:

+
+

The antimalware engine was downloaded and is configured to run offline on the next system restart.

+
+

Description:

+
+

Windows Defender downloaded and configured Windows Defender Offline to run on the next reboot.

+
Event ID: 2031 +

Symbolic name:

+
+

MALWAREPROTECTION_OFFLINE_SCAN_INSTALL_FAILED +

+
+

Message:

+
+

The antimalware engine was unable to download and configure an offline scan.

+
+

Description:

+
+

+

Windows Defender has encountered an error trying to download and configure Windows Defender Offline.

+
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
+

+
Event ID: 2040 +

Symbolic name:

+
+

MALWAREPROTECTION_OS_EXPIRING +

+
+

Message:

+
+

Antimalware support for this operating system version will soon end. +

+
+

Description:

+
+

The support for your operating system will expire shortly. Running Windows Defender on an out of support operating system is not an adequate solution to protect against threats.

+
Event ID: 2041 +

Symbolic name:

+
+

MALWAREPROTECTION_OS_EOL +

+
+

Message:

+
+

Antimalware support for this operating system has ended. You must upgrade the operating system for continued support. +

+
+

Description:

+
+

The support for your operating system has expired. Running Windows Defender on an out of support operating system is not an adequate solution to protect against threats.

+
Event ID: 2042 +

Symbolic name:

+
+

MALWAREPROTECTION_PROTECTION_EOL +

+
+

Message:

+
+

The antimalware engine no longer supports this operating system, and is no longer protecting your system from malware. +

+
+

Description:

+
+

The support for your operating system has expired. Windows Defender is no longer supported on your operating system, has stopped functioning, and is not protecting against malware threats.

+
Event ID: 3002 +

Symbolic name:

+
+

MALWAREPROTECTION_RTP_FEATURE_FAILURE +

+
+

Message:

+
+

Real-time protection encountered an error and failed.

+
+

Description:

+
+

+

Windows Defender Real-Time Protection feature has encountered an error and failed.

+
+
Feature: <Feature>, for example: +
    +
  • On Access
  • +
  • Internet Explorer downloads and Microsoft Outlook Express attachments
  • +
  • Behavior monitoring
  • +
  • Network Inspection System
  • +
+
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
Reason: The reason Windows Defender real-time protection has restarted a feature.
+
+

+
+

User action:

+
+

You should restart the system then run a full scan because it’s possible the system was not protected for some time. +

+

The Windows Defender client’s real-time protection feature encountered an error because one of the services failed to start. +

+

If it is followed by a 3007 event ID, the failure was temporary and the antimalware client recovered from the failure. +

+
Event ID: 3007 +

Symbolic name:

+
+

MALWAREPROTECTION_RTP_FEATURE_RECOVERED

+
+

Message:

+
+

Real-time protection recovered from a failure. We recommend running a full system scan when you see this error. +

+
+

Description:

+
+

+

Windows Defender Real-time Protection has restarted a feature. It is recommended that you run a full system scan to detect any items that may have been missed while this agent was down.

+
+
Feature: <Feature>, for example: +
    +
  • On Access
  • +
  • IE downloads and Outlook Express attachments
  • +
  • Behavior monitoring
  • +
  • Network Inspection System
  • +
+
+
Reason: The reason Windows Defender real-time protection has restarted a feature.
+
+

+
+

User action:

+
+

The real-time protection feature has restarted. If this event happens again, contact Microsoft Technical Support.

+
Event ID: 5000 +

Symbolic name:

+
+

MALWAREPROTECTION_RTP_ENABLED +

+
+

Message:

+
+

Real-time protection is enabled. +

+
+

Description:

+
+

Windows Defender Real-time Protection scanning for malware and other potentially unwanted software was enabled.

+
Event ID: 5001 +

Symbolic name:

+
+

MALWAREPROTECTION_RTP_DISABLED

+
+

Message:

+
+

Real-time protection is disabled. +

+
+

Description:

+
+

Windows Defender Real-time Protection scanning for malware and other potentially unwanted software was disabled.

+
Event ID: 5004 +

Symbolic name:

+
+

MALWAREPROTECTION_RTP_FEATURE_CONFIGURED +

+
+

Message:

+
+

The real-time protection configuration changed. +

+
+

Description:

+
+

+

Windows Defender Real-time Protection feature configuration has changed.

+
+
Feature: <Feature>, for example: +
    +
  • On Access
  • +
  • IE downloads and Outlook Express attachments
  • +
  • Behavior monitoring
  • +
  • Network Inspection System
  • +
+
+
Configuration:
+
+

+
Event ID: 5007 +

Symbolic name:

+
+

MALWAREPROTECTION_CONFIG_CHANGED +

+
+

Message:

+
+

The antimalware platform configuration changed.

+
+

Description:

+
+

+

Windows Defender Configuration has changed. If this is an unexpected event you should review the settings as this may be the result of malware.

+
+
Old value: <Old value number> +Old Windows Defender configuration value.
+
New value: <New value number> +New Windows Defender configuration value.
+
+

+
Event ID: 5008 +

Symbolic name:

+
+

MALWAREPROTECTION_ENGINE_FAILURE

+
+

Message:

+
+

The antimalware engine encountered an error and failed.

+
+

Description:

+
+

+

Windows Defender engine has been terminated due to an unexpected error.

+
+
Failure Type: <Failure type>, for example: +Crash +or Hang
+
Exception Code: <Error code>
+
Resource: <Resource>
+
+

+
+

User action:

+
+

To troubleshoot this event:

    +
  1. Try to restart the service.
      +
    • For antimalware, antivirus and spyware, at an elevated command prompt, type net stop msmpsvc, and then type net start msmpsvc to restart the antimalware engine.
    • +
    • For the Network Inspection System, at an elevated command prompt, type net start nissrv, and then type net start nissrv to restart the Network Inspection System engine by using the NiSSRV.exe file. + + + +
    • +
    +
  2. +
  3. If it fails in the same way, look up the error code by accessing the Microsoft Support Site and entering the error number in the Search box, and contact Microsoft Technical Support.
  4. +
+

+
+

User action:

+
+

The Windows Defender client engine stopped due to an unexpected error.

+

To troubleshoot this event: +

    +
  1. Run the scan again.
  2. +
  3. If it fails in the same way, go to the Microsoft Support site, enter the error number in the Search box to look for the error code.
  4. +
  5. Contact Microsoft Technical Support. +
  6. +
+

+
Event ID: 5009 +

Symbolic name:

+
+

MALWAREPROTECTION_ANTISPYWARE_ENABLED +

+
+

Message:

+
+

Scanning for malware and other potentially unwanted software is enabled. +

+
+

Description:

+
+

Windows Defender scanning for malware and other potentially unwanted software has been enabled.

+
Event ID: 5010 +

Symbolic name:

+
+

MALWAREPROTECTION_ANTISPYWARE_DISABLED +

+
+

Message:

+
+

Scanning for malware and other potentially unwanted software is disabled.

+
+

Description:

+
+

Windows Defender scanning for malware and other potentially unwanted software is disabled.

+
Event ID: 5011 +

Symbolic name:

+
+

MALWAREPROTECTION_ANTIVIRUS_ENABLED

+
+

Message:

+
+

Scanning for viruses is enabled.

+
+

Description:

+
+

Windows Defender scanning for viruses has been enabled.

+
Event ID: 5012 +

Symbolic name:

+
+

MALWAREPROTECTION_ANTIVIRUS_DISABLED +

+
+

Message:

+
+

Scanning for viruses is disabled. +

+
+

Description:

+
+

Windows Defender scanning for viruses is disabled.

+
Event ID: 5100 +

Symbolic name:

+
+

MALWAREPROTECTION_EXPIRATION_WARNING_STATE +

+
+

Message:

+
+

The antimalware platform will expire soon. +

+
+

Description:

+
+

+

Windows Defender has entered a grace period and will soon expire. After expiration, this program will disable protection against viruses, spyware, and other potentially unwanted software.

+
+
Expiration Reason: The reason Windows Defender will expire.
+
Expiration Date: The date Windows Defender will expire.
+
+

+
Event ID: 5101 +

Symbolic name:

+
+

MALWAREPROTECTION_DISABLED_EXPIRED_STATE +

+
+

Message:

+
+

The antimalware platform is expired. +

+
+

Description::

+
+

+

Windows Defender grace period has expired. Protection against viruses, spyware, and other potentially unwanted software is disabled.

+
+
Expiration Reason:
+
Expiration Date:
+
Error Code: <Error code> +Result code associated with threat status. Standard HRESULT values.
+
Error Description: <Error description> +Description of the error.
+
+

+
- -  - -If this event persists: - -1. Run the scan again. -2. If it fails in the same way, go to the [Microsoft Support site](http://go.microsoft.com/fwlink/?LinkId=215163), enter the error number in the **Search** box to look for the error code. -3. Contact [Microsoft Technical Support](http://go.microsoft.com/fwlink/?LinkId=215491). - -Event ID: 1120 -Symbolic name: - -**MALWAREPROTECTION\_THREAT\_HASH** - -Message: - -**Windows Defender has deduced the hashes for a threat resource.** - -Description: - -Windows Defender client is up and running in a healthy state. - -Current Platform Version: <Current platform version> -Threat Resource Path: <Path> -Hashes: <Hashes> -**Note**  This event will only be logged if the following policy is set: **ThreatFileHashLogging unsigned**. - -  - -Event ID: 1150 -Symbolic name: - -**MALWAREPROTECTION\_SERVICE\_HEALTHY** - -Message: - -**If your antimalware platform reports status to a monitoring platform, this event indicates that the antimalware platform is running and in a healthy state.** - -Description: - -Windows Defender client is up and running in a healthy state. - -Platform Version: <Current platform version> -Signature Version: <Definition version> -Engine Version: <Antimalware Engine version> -User action: - -No action is necessary. The Windows Defenderclient is in a healthy state. This event is reported on an hourly basis. - -Event ID: 2000 -Symbolic name: - -**MALWAREPROTECTION\_SIGNATURE\_UPDATED** - -Message: - -**The antimalware definitions updated successfully.** - -Description: - -Windows Defender signature version has been updated. - -Current Signature Version: <Current signature version> -Previous Signature Version: <Previous signature version> -Signature Type: <Signature type>, for example: -- Antivirus -- Antispyware -- Antimalware -- Network Inspection System - -Update Type: <Update type>, either Full or Delta. -User: <Domain>\\<User> -Current Engine Version: <Current engine version> -Previous Engine Version: <Previous engine version> -User action: - -No action is necessary. The Windows Defender client is in a healthy state. This event is reported when signatures are successfully updated. - -Event ID: 2001 -Symbolic name: - -**MALWAREPROTECTION\_SIGNATURE\_UPDATE\_FAILED** - -Message: - -**The antimalware definition update failed.** - -Description: - -Windows Defender has encountered an error trying to update signatures. - -New Signature Version: <New version number> -Previous Signature Version: <Previous signature version> -Update Source: <Update source>, for example: -- Signature update folder -- Internal definition update server -- Microsoft Update Server -- File share -- Microsoft Malware Protection Center (MMPC) - -Update Stage: <Update stage>, for example: -- Search -- Download -- Install - -Source Path: File share name for Universal Naming Convention (UNC), server name for Windows Server Update Services (WSUS)/Microsoft Update/ADL. -Signature Type: <Signature type>, for example: -- Antivirus -- Antispyware -- Antimalware -- Network Inspection System - -Update Type: <Update type>, either Full or Delta. -User: <Domain>\\<User> -Current Engine Version: <Current engine version> -Previous Engine Version: <Previous engine version> -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -User action: - -This error occurs when there is a problem updating definitions. - -To troubleshoot this event: - -1. Update the definitions. Either: - 1. Click the **Update definitions** button on the **Update** tab in Windows Defender. ![update definitions in windows defender](images/defender-updatedefs2.png) - - Or, - - 2. Download the latest definitions from the [Microsoft Malware Protection Center](http://go.microsoft.com/fwlink/?LinkID=200965). - - Note: The size of the definitions file downloaded from the [Microsoft Malware Protection Center](http://go.microsoft.com/fwlink/?LinkID=200965) can exceed 60 MB and should not be used as a long-term solution for updating definitions. - -2. Review the entries in the %Windir%\\WindowsUpdate.log file for more information about this error. -3. Contact [Microsoft Technical Support](http://go.microsoft.com/fwlink/?LinkId=215491). - -Event ID: 2002 -Symbolic name: - -**MALWAREPROTECTION\_ENGINE\_UPDATED** - -Message: - -**The antimalware engine updated successfully.** - -Description: - -Windows Defender engine version has been updated. - -Current Engine Version: <Current engine version> -Previous Engine Version: <Previous engine version> -Engine Type: <Engine type>, either antimalware engine or Network Inspection System engine. -User: <Domain>\\<User> -User action: - -No action is necessary. The Windows Defender client is in a healthy state. This event is reported when the antimalware engine is successfully updated. - -Event ID: 2003 -Symbolic name: - -**MALWAREPROTECTION\_ENGINE\_UPDATE\_FAILED** - -Message: - -**The antimalware engine update failed.** - -Description: - -Windows Defender has encountered an error trying to update the engine. - -New Engine Version: -Previous Engine Version: <Previous engine version> -Engine Type: <Engine type>, either antimalware engine or Network Inspection System engine. -User: <Domain>\\<User> -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -User action: - -The Windows Defender client update failed. This event occurs when the client fails to update itself. This event is usually due to an interruption in network connectivity during an update. - -To troubleshoot this event: - -1. Update the definitions. Either: - 1. Click the **Update definitions** button on the **Update** tab in Windows Defender. ![update definitions in windows defender](images/defender-updatedefs2.png) - - Or, - - 2. Download the latest definitions from the [Microsoft Malware Protection Center](http://go.microsoft.com/fwlink/?LinkID=200965). - - Note: The size of the definitions file downloaded from the [Microsoft Malware Protection Center](http://go.microsoft.com/fwlink/?LinkID=200965) can exceed 60 MB and should not be used as a long-term solution for updating definitions. - -2. Contact [Microsoft Technical Support](http://go.microsoft.com/fwlink/?LinkId=215491). - -Event ID: 2004 -Symbolic name: - -**MALWAREPROTECTION\_SIGNATURE\_REVERSION** - -Message: - -**There was a problem loading antimalware definitions. The antimalware engine will attempt to load the last-known good set of definitions.** - -Description: - -Windows Defender has encountered an error trying to load signatures and will attempt reverting back to a known-good set of signatures. - -Signatures Attempted: -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -Signature Version: <Definition version> -Engine Version: <Antimalware engine version> -User action: - -The Windows Defender client attempted to download and install the latest definitions file and failed. This error can occur when the client encounters an error while trying to load the definitions, or if the file is corrupt. Windows Defender will attempt to revert back to a known-good set of definitions. - -To troubleshoot this event: - -1. Restart the computer and try again. -2. Download the latest definitions from the [Microsoft Malware Protection Center](http://go.microsoft.com/fwlink/?LinkID=200965). - - Note: The size of the definitions file downloaded from the [Microsoft Malware Protection Center](http://go.microsoft.com/fwlink/?LinkID=200965) can exceed 60 MB and should not be used as a long-term solution for updating definitions. - -3. Contact [Microsoft Technical Support](http://go.microsoft.com/fwlink/?LinkId=215491). - -Event ID: 2005 -Symbolic name: - -**MALWAREPROTECTION\_ENGINE\_UPDATE\_PLATFORMOUTOFDATE** - -Message: - -**The antimalware engine failed to load because the antimalware platform is out of date. The antimalware platform will load the last-known good antimalware engine and attempt to update.** - -Description: - -Windows Defender could not load antimalware engine because current platform version is not supported. Windows Defender will revert back to the last known-good engine and a platform update will be attempted. - -Current Platform Version: <Current platform version> -Event ID: 2006 -Symbolic name: - -**MALWAREPROTECTION\_PLATFORM\_UPDATE\_FAILED** - -Message: - -**The platform update failed.** - -Description: - -Windows Defender has encountered an error trying to update the platform. - -Current Platform Version: <Current platform version> -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -Event ID: 2007 -Symbolic name: - -**MALWAREPROTECTION\_PLATFORM\_ALMOSTOUTOFDATE** - -Message: - -**The platform will soon be out of date. Download the latest platform to maintain up-to-date protection.** - -Description: - -Windows Defender will soon require a newer platform version to support future versions of the antimalware engine. Download the latest Windows Defender platform to maintain the best level of protection available. - -Current Platform Version: <Current platform version> -Event ID: 2010 -Symbolic name: - -**MALWAREPROTECTION\_SIGNATURE\_FASTPATH\_UPDATED** - -Message: - -**The antimalware engine used the Dynamic Signature Service to get additional definitions.** - -Description: - -Windows Defender used *Dynamic Signature Service* to retrieve additional signatures to help protect your machine. - -Current Signature Version: <Current signature version> -Signature Type: <Signature type>, for example: -- Antivirus -- Antispyware -- Antimalware -- Network Inspection System - -Current Engine Version: <Current engine version> -Dynamic Signature Type: <Dynamic signature type>, for example: -- Version -- Timestamp -- No limit -- Duration - -Persistence Path: <Path> -Dynamic Signature Version: <Version number> -Dynamic Signature Compilation Timestamp: <Timestamp> -Persistence Limit Type: <Persistence limit type>, for example: -- VDM version -- Timestamp -- No limit - -Persistence Limit: Persistence limit of the fastpath signature. -Event ID: 2011 -Symbolic name: - -**MALWAREPROTECTION\_SIGNATURE\_FASTPATH\_DELETED** - -Message: - -**The Dynamic Signature Service deleted the out-of-date dynamic definitions.** - -Description: - -Windows Defender used *Dynamic Signature Service* to discard obsolete signatures. - -Current Signature Version: <Current signature version> -Signature Type: <Signature type>, for example: -- Antivirus -- Antispyware -- Antimalware -- Network Inspection System - -Current Engine Version: <Current engine version> -Dynamic Signature Type: <Dynamic signature type>, for example: -- Version -- Timestamp -- No limit -- Duration - -Persistence Path: <Path> -Dynamic Signature Version: <Version number> -Dynamic Signature Compilation Timestamp: <Timestamp> -Removal Reason: -Persistence Limit Type: <Persistence limit type>, for example: -- VDM version -- Timestamp -- No limit - -Persistence Limit: Persistence limit of the fastpath signature. -User action: - -No action is necessary. The Windows Defender client is in a healthy state. This event is reported when the Dynamic Signature Service successfully deletes out-of-date dynamic definitions. - -Event ID: 2012 -Symbolic name: - -**MALWAREPROTECTION\_SIGNATURE\_FASTPATH\_UPDATE\_FAILED** - -Message: - -**The antimalware engine encountered an error when trying to use the Dynamic Signature Service.** - -Description: - -Windows Defender has encountered an error trying to use *Dynamic Signature Service*. - -Current Signature Version: <Current signature version> -Signature Type: <Signature type>, for example: -- Antivirus -- Antispyware -- Antimalware -- Network Inspection System - -Current Engine Version: <Current engine version> -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -Dynamic Signature Type: <Dynamic signature type>, for example: -- Version -- Timestamp -- No limit -- Duration - -Persistence Path: <Path> -Dynamic Signature Version: <Version number> -Dynamic Signature Compilation Timestamp: <Timestamp> -Persistence Limit Type: <Persistence limit type>, for example: -- VDM version -- Timestamp -- No limit - -Persistence Limit: Persistence limit of the fastpath signature. -User action: - -Check your Internet connectivity settings. - -Event ID: 2013 -Symbolic name: - -**MALWAREPROTECTION\_SIGNATURE\_FASTPATH\_DELETED\_ALL** - -Message: - -**The Dynamic Signature Service deleted all dynamic definitions.** - -Description: - -Windows Defender discarded all *Dynamic Signature Service* signatures. - -Current Signature Version: <Current signature version> -Event ID: 2020 -Symbolic name: - -**MALWAREPROTECTION\_CLOUD\_CLEAN\_RESTORE\_FILE\_DOWNLOADED** - -Message: - -**The antimalware engine downloaded a clean file.** - -Description: - -Windows Defender downloaded a clean file. - -Filename: <File name> Name of the file. -Current Signature Version: <Current signature version> -Current Engine Version: <Current engine version> -Event ID: 2021 -Symbolic name: - -**MALWAREPROTECTION\_CLOUD\_CLEAN\_RESTORE\_FILE\_DOWNLOAD\_FAILED** - -Message: - -**The antimalware engine failed to download a clean file.** - -Description: - -Windows Defender has encountered an error trying to download a clean file. - -Filename: <File name> Name of the file. -Current Signature Version: <Current signature version> -Current Engine Version: <Current engine version> -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -User action: - -Check your Internet connectivity settings. - -The Windows Defender client encountered an error when using the Dynamic Signature Service to download the latest definitions to a specific threat. This error is likely caused by a network connectivity issue. - -Event ID: 2030 -Symbolic name: - -**MALWAREPROTECTION\_OFFLINE\_SCAN\_INSTALLED** - -Message: - -**The antimalware engine was downloaded and is configured to run offline on the next system restart.** - -Description: - -Windows Defender downloaded and configured Windows Defender Offline to run on the next reboot. - -Event ID: 2031 -Symbolic name: - -**MALWAREPROTECTION\_OFFLINE\_SCAN\_INSTALL\_FAILED** - -Message: - -**The antimalware engine was unable to download and configure an offline scan.** - -Description: - -Windows Defender has encountered an error trying to download and configure Windows Defender Offline. - -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -Event ID: 2040 -Symbolic name: - -**MALWAREPROTECTION\_OS\_EXPIRING** - -Message: - -**Antimalware support for this operating system version will soon end.** - -Description: - -The support for your operating system will expire shortly. Running Windows Defender on an out of support operating system is not an adequate solution to protect against threats. - -Event ID: 2041 -Symbolic name: - -**MALWAREPROTECTION\_OS\_EOL** - -Message: - -**Antimalware support for this operating system has ended. You must upgrade the operating system for continued support.** - -Description: - -The support for your operating system has expired. Running Windows Defender on an out of support operating system is not an adequate solution to protect against threats. - -Event ID: 2042 -Symbolic name: - -**MALWAREPROTECTION\_PROTECTION\_EOL** - -Message: - -**The antimalware engine no longer supports this operating system, and is no longer protecting your system from malware.** - -Description: - -The support for your operating system has expired. Windows Defender is no longer supported on your operating system, has stopped functioning, and is not protecting against malware threats. - -Event ID: 3002 -Symbolic name: - -**MALWAREPROTECTION\_RTP\_FEATURE\_FAILURE** - -Message: - -**Real-time protection encountered an error and failed.** - -Description: - -Windows Defender Real-Time Protection feature has encountered an error and failed. - -Feature: <Feature>, for example: -- On Access -- Internet Explorer downloads and Microsoft Outlook Express attachments -- Behavior monitoring -- Network Inspection System - -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -Reason: The reason Windows Defender real-time protection has restarted a feature. -User action: - -You should restart the system then run a full scan because it’s possible the system was not protected for some time. - -The Windows Defender client’s real-time protection feature encountered an error because one of the services failed to start. - -If it is followed by a 3007 event ID, the failure was temporary and the antimalware client recovered from the failure. - -Event ID: 3007 -Symbolic name: - -**MALWAREPROTECTION\_RTP\_FEATURE\_RECOVERED** - -Message: - -**Real-time protection recovered from a failure. We recommend running a full system scan when you see this error.** - -Description: - -Windows Defender Real-time Protection has restarted a feature. It is recommended that you run a full system scan to detect any items that may have been missed while this agent was down. - -Feature: <Feature>, for example: -- On Access -- IE downloads and Outlook Express attachments -- Behavior monitoring -- Network Inspection System - -Reason: The reason Windows Defender real-time protection has restarted a feature. -User action: - -The real-time protection feature has restarted. If this event happens again, contact [Microsoft Technical Support](http://go.microsoft.com/fwlink/?LinkId=215491). - -Event ID: 5000 -Symbolic name: - -**MALWAREPROTECTION\_RTP\_ENABLED** - -Message: - -**Real-time protection is enabled.** - -Description: - -Windows Defender Real-time Protection scanning for malware and other potentially unwanted software was enabled. - -Event ID: 5001 -Symbolic name: - -**MALWAREPROTECTION\_RTP\_DISABLED** - -Message: - -**Real-time protection is disabled.** - -Description: - -Windows Defender Real-time Protection scanning for malware and other potentially unwanted software was disabled. - -Event ID: 5004 -Symbolic name: - -**MALWAREPROTECTION\_RTP\_FEATURE\_CONFIGURED** - -Message: - -**The real-time protection configuration changed.** - -Description: - -Windows Defender Real-time Protection feature configuration has changed. - -Feature: <Feature>, for example: -- On Access -- IE downloads and Outlook Express attachments -- Behavior monitoring -- Network Inspection System - -Configuration: -Event ID: 5007 -Symbolic name: - -**MALWAREPROTECTION\_CONFIG\_CHANGED** - -Message: - -**The antimalware platform configuration changed.** - -Description: - -Windows Defender Configuration has changed. If this is an unexpected event you should review the settings as this may be the result of malware. - -Old value: <Old value number> Old Windows Defender configuration value. -New value: <New value number> New Windows Defender configuration value. -Event ID: 5008 -Symbolic name: - -**MALWAREPROTECTION\_ENGINE\_FAILURE** - -Message: - -**The antimalware engine encountered an error and failed.** - -Description: - -Windows Defender engine has been terminated due to an unexpected error. - -Failure Type: <Failure type>, for example: Crash or Hang -Exception Code: <Error code> -Resource: <Resource> -User action: - -To troubleshoot this event: - -1. Try to restart the service. - - For antimalware, antivirus and spyware, at an elevated command prompt, type **net stop msmpsvc**, and then type **net start msmpsvc** to restart the antimalware engine. - - For the *Network Inspection System*, at an elevated command prompt, type **net start nissrv**, and then type **net start nissrv** to restart the *Network Inspection System* engine by using the NiSSRV.exe file. - -2. If it fails in the same way, look up the error code by accessing the [Microsoft Support Site](http://go.microsoft.com/fwlink/?LinkId=215163) and entering the error number in the **Search** box, and contact [Microsoft Technical Support](http://go.microsoft.com/fwlink/?LinkId=215491). - -User action: - -The Windows Defender client engine stopped due to an unexpected error. - -To troubleshoot this event: - -1. Run the scan again. -2. If it fails in the same way, go to the [Microsoft Support site](http://go.microsoft.com/fwlink/?LinkId=215163), enter the error number in the **Search** box to look for the error code. -3. Contact [Microsoft Technical Support](http://go.microsoft.com/fwlink/?LinkId=215491). - -Event ID: 5009 -Symbolic name: - -**MALWAREPROTECTION\_ANTISPYWARE\_ENABLED** - -Message: - -**Scanning for malware and other potentially unwanted software is enabled.** - -Description: - -Windows Defender scanning for malware and other potentially unwanted software has been enabled. - -Event ID: 5010 -Symbolic name: - -**MALWAREPROTECTION\_ANTISPYWARE\_DISABLED** - -Message: - -**Scanning for malware and other potentially unwanted software is disabled.** - -Description: - -Windows Defender scanning for malware and other potentially unwanted software is disabled. - -Event ID: 5011 -Symbolic name: - -**MALWAREPROTECTION\_ANTIVIRUS\_ENABLED** - -Message: - -**Scanning for viruses is enabled.** - -Description: - -Windows Defender scanning for viruses has been enabled. - -Event ID: 5012 -Symbolic name: - -**MALWAREPROTECTION\_ANTIVIRUS\_DISABLED** - -Message: - -**Scanning for viruses is disabled.** - -Description: - -Windows Defender scanning for viruses is disabled. - -Event ID: 5100 -Symbolic name: - -**MALWAREPROTECTION\_EXPIRATION\_WARNING\_STATE** - -Message: - -**The antimalware platform will expire soon.** - -Description: - -Windows Defender has entered a grace period and will soon expire. After expiration, this program will disable protection against viruses, spyware, and other potentially unwanted software. - -Expiration Reason: The reason Windows Defender will expire. -Expiration Date: The date Windows Defender will expire. -Event ID: 5101 -Symbolic name: - -**MALWAREPROTECTION\_DISABLED\_EXPIRED\_STATE** - -Message: - -**The antimalware platform is expired.** - -Description:: - -Windows Defender grace period has expired. Protection against viruses, spyware, and other potentially unwanted software is disabled. - -Expiration Reason: -Expiration Date: -Error Code: <Error code> Result code associated with threat status. Standard HRESULT values. -Error Description: <Error description> Description of the error. -  ## Windows Defender client error codes @@ -1564,303 +2686,609 @@ This section provides the following information about Windows Defender client er Use the information in these tables to help troubleshoot Windows Defender error codes. -External error codes -Error code -Message displayed -Possible reason for error -What to do now -0x80508007 - -**ERR\_MP\_NO\_MEMORY** - -This error indicates that you might have run out of memory. - -1. Check the available memory on your device. -2. Close any unused applications that are running to free up memory on your device. -3. Restart the device and run the scan again. - -0x8050800C - -**ERR\_MP\_BAD\_INPUT\_DATA** - -This error indicates that there might be a problem with your security product. - -1. Update the definitions. Either: - 1. Click the **Update definitions** button on the **Update** tab in Windows Defender. ![update definitions in windows defender](images/defender-updatedefs2.png) - - Or, - - 2. Download the latest definitions from the [Microsoft Malware Protection Center](http://go.microsoft.com/fwlink/?LinkID=200965). - - Note: The size of the definitions file downloaded from the [Microsoft Malware Protection Center](http://go.microsoft.com/fwlink/?LinkID=200965) can exceed 60 MB and should not be used as a long-term solution for updating definitions. - -2. Run a full scan. -3. Restart the device and try again. - -0x80508020 - -**ERR\_MP\_BAD\_CONFIGURATION** - -This error indicates that there might be an engine configuration error; commonly, this is related to input data that does not allow the engine to function properly. - -0x805080211 - -**ERR\_MP\_QUARANTINE\_FAILED** - -This error indicates that Windows Defender failed to quarantine a threat. - -0x80508022 - -**ERR\_MP\_REBOOT\_REQUIRED** - -This error indicates that a reboot is required to complete threat removal. - -0x80508023 - -**ERR\_MP\_THREAT\_NOT\_FOUND** - -This error indicates that the threat might no longer be present on the media, or malware might be stopping you from scanning your device. - -Run the [Microsoft Safety Scanner](https://www.microsoft.com/security/scanner/default.aspx) then update your security software and try again. - -**ERR\_MP\_FULL\_SCAN\_REQUIRED** - -This error indicates that a full system scan might be required. - -Run a full system scan. - -0x80508024 - -0x80508025 - -**ERR\_MP\_MANUAL\_STEPS\_REQUIRED** - -This error indicates that manual steps are required to complete threat removal. - -Follow the manual remediation steps outlined in the [Microsoft Malware Protection Encyclopedia](https://www.microsoft.com/security/portal/threat/Threats.aspx). You can find a threat-specific link in the event history. - -0x80508026 - -**ERR\_MP\_REMOVE\_NOT\_SUPPORTED** - -This error indicates that removal inside the container type might not be not supported. - -Windows Defender is not able to remediate threats detected inside the archive. Consider manually removing the detected resources. - -0x80508027 - -**ERR\_MP\_REMOVE\_LOW\_MEDIUM\_DISABLED** - -This error indicates that removal of low and medium threats might be disabled. - -Check the detected threats and resolve them as required. - -0x80508029 - -**ERROR\_MP\_RESCAN\_REQUIRED** - -This error indicates a rescan of the threat is required. - -Run a full system scan. - -0x80508030 - -**ERROR\_MP\_CALLISTO\_REQUIRED** - -This error indicates that an offline scan is required. - -Run Windows Defender Offline. You can read about how to do this in the [Windows Defender Offline article](http://windows.microsoft.com/windows/what-is-windows-defender-offline). - -0x80508031 - -**ERROR\_MP\_PLATFORM\_OUTDATED** - -This error indicates that Windows Defender does not support the current version of the platform and requires a new version of the platform. - -You can only use Windows Defender in Windows 10. For Windows 8, Windows 7 and Windows Vista, you can use [System Center Endpoint Protection](https://www.microsoft.com/server-cloud/system-center/endpoint-protection-2012.aspx). - -  - -Internal error codes -Error code -Message displayed -Possible reason for error -What to do now -0x80501004 - -**ERROR\_MP\_NO\_INTERNET\_CONN** - -Check your Internet connection, then run the scan again. - -Check your Internet connection, then run the scan again. - -0x80501000 - -**ERROR\_MP\_UI\_CONSOLIDATION\_BAS**E - -This is an internal error. The cause is not clearly defined. - -1. Update the definitions. Either: - 1. Click the **Update definitions** button on the **Update** tab in Windows Defender. ![update definitions in windows defender](images/defender-updatedefs2.png) - - Or, - - 2. Download the latest definitions from the [Microsoft Malware Protection Center](http://go.microsoft.com/fwlink/?LinkID=200965). - - Note: The size of the definitions file downloaded from the [Microsoft Malware Protection Center](http://go.microsoft.com/fwlink/?LinkID=200965) can exceed 60 MB and should not be used as a long-term solution for updating definitions. - -2. Run a full scan. -3. Restart the device and try again. - -0x80501001 - -**ERROR\_MP\_ACTIONS\_FAILED** - -0x80501002 - -**ERROR\_MP\_NOENGINE** - -0x80501003 - -**ERROR\_MP\_ACTIVE\_THREATS** - -0x805011011 - -**MP\_ERROR\_CODE\_LUA\_CANCELLED** - -0x80501101 - -**ERROR\_LUA\_CANCELLATION** - -0x80501102 - -**MP\_ERROR\_CODE\_ALREADY\_SHUTDOWN** - -0x80501103 - -**MP\_ERROR\_CODE\_RDEVICE\_S\_ASYNC\_CALL\_PENDING** - -0x80501104 - -**MP\_ERROR\_CODE\_CANCELLED** - -0x80501105 - -**MP\_ERROR\_CODE\_NO\_TARGETOS** - -0x80501106 - -**MP\_ERROR\_CODE\_BAD\_REGEXP** - -0x80501107 - -**MP\_ERROR\_TEST\_INDUCED\_ERROR** - -0x80501108 - -**MP\_ERROR\_SIG\_BACKUP\_DISABLED** - -0x80508001 - -**ERR\_MP\_BAD\_INIT\_MODULES** - -0x80508002 - -**ERR\_MP\_BAD\_DATABASE** - -0x80508004 - -**ERR\_MP\_BAD\_UFS** - -0x8050800C - -**ERR\_MP\_BAD\_INPUT\_DATA** - -0x8050800D - -**ERR\_MP\_BAD\_GLOBAL\_STORAGE** - -0x8050800E - -**ERR\_MP\_OBSOLETE** - -0x8050800F - -**ERR\_MP\_NOT\_SUPPORTED** - -0x8050800F 0x80508010 - -**ERR\_MP\_NO\_MORE\_ITEMS** - -0x80508011 - -**ERR\_MP\_DUPLICATE\_SCANID** - -0x80508012 - -**ERR\_MP\_BAD\_SCANID** - -0x80508013 - -**ERR\_MP\_BAD\_USERDB\_VERSION** - -0x80508014 - -**ERR\_MP\_RESTORE\_FAILED** - -0x80508016 - -**ERR\_MP\_BAD\_ACTION** - -0x80508019 - -**ERR\_MP\_NOT\_FOUND** - -0x80509001 - -**ERR\_RELO\_BAD\_EHANDLE** - -0x80509003 - -**ERR\_RELO\_KERNEL\_NOT\_LOADED** - -0x8050A001 - -**ERR\_MP\_BADDB\_OPEN** - -0x8050A002 - -**ERR\_MP\_BADDB\_HEADER** - -0x8050A003 - -**ERR\_MP\_BADDB\_OLDENGINE** - -0x8050A004 - -**ERR\_MP\_BADDB\_CONTENT** - -0x8050A005 - -**ERR\_MP\_BADDB\_NOTSIGNED** - -0x8050801 - -**ERR\_MP\_REMOVE\_FAILED** - -This is an internal error. It might be triggered when malware removal is not successful. - -0x80508018 - -**ERR\_MP\_SCAN\_ABORTED** - -This is an internal error. It might have triggered when a scan fails to complete. - -  + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
External error codes
Error codeMessage displayedPossible reason for errorWhat to do now
+

0x80508007 +

+
+

ERR_MP_NO_MEMORY +

+
+

This error indicates that you might have run out of memory. +

+
+

+

    +
  1. Check the available memory on your device.
  2. +
  3. Close any unused applications that are running to free up memory on your device.
  4. +
  5. Restart the device and run the scan again. +
  6. +
+

+
+

0x8050800C

+
+

ERR_MP_BAD_INPUT_DATA

+
+

This error indicates that there might be a problem with your security product.

+
+

+

    +
  1. Update the definitions. Either:
      +
    1. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows Defender

      Or,

      +
    2. +
    3. Download the latest definitions from the Microsoft Malware Protection Center. + +

      Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

      +
    4. +
    +
  2. +
  3. Run a full scan. +
  4. +
  5. Restart the device and try again.
  6. +
+

+
+

0x80508020

+
+

ERR_MP_BAD_CONFIGURATION +

+
+

This error indicates that there might be an engine configuration error; commonly, this is related to input +data that does not allow the engine to function properly. +

+
+

0x805080211 +

+
+

ERR_MP_QUARANTINE_FAILED +

+
+

This error indicates that Windows Defender failed to quarantine a threat. +

+
+

0x80508022 +

+
+

ERR_MP_REBOOT_REQUIRED +

+
+

This error indicates that a reboot is required to complete threat removal. +

+
+

0x80508023 +

+
+

ERR_MP_THREAT_NOT_FOUND +

+
+

This error indicates that the threat might no longer be present on the media, or malware might be stopping you from scanning your device. +

+
+

Run the Microsoft Safety Scanner then update your security software and try again. +

+
+

ERR_MP_FULL_SCAN_REQUIRED +

+
+

This error indicates that a full system scan might be required. +

+
+

Run a full system scan. +

+
+

0x80508024 +

+
+

0x80508025 +

+
+

ERR_MP_MANUAL_STEPS_REQUIRED +

+
+

This error indicates that manual steps are required to complete threat removal. +

+
+

Follow the manual remediation steps outlined in the Microsoft Malware Protection Encyclopedia. You can find a threat-specific link in the event history. +

+
+

0x80508026 +

+
+

ERR_MP_REMOVE_NOT_SUPPORTED +

+
+

This error indicates that removal inside the container type might not be not supported. +

+
+

Windows Defender is not able to remediate threats detected inside the archive. Consider manually removing the detected resources. +

+
+

0x80508027 +

+
+

ERR_MP_REMOVE_LOW_MEDIUM_DISABLED +

+
+

This error indicates that removal of low and medium threats might be disabled. +

+
+

Check the detected threats and resolve them as required. +

+
+

0x80508029 +

+
+

ERROR_MP_RESCAN_REQUIRED +

+
+

This error indicates a rescan of the threat is required. +

+
+

Run a full system scan. +

+
+

0x80508030 +

+
+

ERROR_MP_CALLISTO_REQUIRED +

+
+

This error indicates that an offline scan is required. +

+
+

Run Windows Defender Offline. You can read about how to do this in the Windows Defender Offline +article.

+
+

0x80508031 +

+
+

ERROR_MP_PLATFORM_OUTDATED +

+
+

This error indicates that Windows Defender does not support the current version of the platform and requires a new version of the platform. +

+
+

You can only use Windows Defender in Windows 10. For Windows 8, Windows 7 and Windows Vista, you can use System Center Endpoint Protection. +

+
+

 

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Internal error codes
Error codeMessage displayedPossible reason for errorWhat to do now
+

0x80501004

+
+

ERROR_MP_NO_INTERNET_CONN +

+
+

Check your Internet connection, then run the scan again.

+
+

Check your Internet connection, then run the scan again.

+
+

0x80501000

+
+

ERROR_MP_UI_CONSOLIDATION_BASE

+
+

This is an internal error. The cause is not clearly defined.

+
+

+

    +
  1. Update the definitions. Either:
      +
    1. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows Defender

      Or,

      +
    2. +
    3. Download the latest definitions from the Microsoft Malware Protection Center. + +

      Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

      +
    4. +
    +
  2. +
  3. Run a full scan. +
  4. +
  5. Restart the device and try again.
  6. +
+

+
+

0x80501001

+
+

ERROR_MP_ACTIONS_FAILED

+
+

0x80501002

+
+

ERROR_MP_NOENGINE

+
+

0x80501003

+
+

ERROR_MP_ACTIVE_THREATS

+
+

0x805011011

+
+

MP_ERROR_CODE_LUA_CANCELLED

+
+

0x80501101

+
+

ERROR_LUA_CANCELLATION

+
+

0x80501102

+
+

MP_ERROR_CODE_ALREADY_SHUTDOWN

+
+

0x80501103

+
+

MP_ERROR_CODE_RDEVICE_S_ASYNC_CALL_PENDING

+
+

0x80501104

+
+

MP_ERROR_CODE_CANCELLED

+
+

0x80501105

+
+

MP_ERROR_CODE_NO_TARGETOS

+
+

0x80501106

+
+

MP_ERROR_CODE_BAD_REGEXP

+
+

0x80501107

+
+

MP_ERROR_TEST_INDUCED_ERROR

+
+

0x80501108

+
+

MP_ERROR_SIG_BACKUP_DISABLED

+
+

0x80508001

+
+

ERR_MP_BAD_INIT_MODULES

+
+

0x80508002

+
+

ERR_MP_BAD_DATABASE

+
+

0x80508004

+
+

ERR_MP_BAD_UFS

+
+

0x8050800C

+
+

ERR_MP_BAD_INPUT_DATA

+
+

0x8050800D

+
+

ERR_MP_BAD_GLOBAL_STORAGE

+
+

0x8050800E

+
+

ERR_MP_OBSOLETE

+
+

0x8050800F

+
+

ERR_MP_NOT_SUPPORTED

+
+

0x8050800F +0x80508010 +

+
+

ERR_MP_NO_MORE_ITEMS

+
+

0x80508011

+
+

ERR_MP_DUPLICATE_SCANID

+
+

0x80508012

+
+

ERR_MP_BAD_SCANID

+
+

0x80508013

+
+

ERR_MP_BAD_USERDB_VERSION

+
+

0x80508014

+
+

ERR_MP_RESTORE_FAILED

+
+

0x80508016

+
+

ERR_MP_BAD_ACTION

+
+

0x80508019

+
+

ERR_MP_NOT_FOUND

+
+

0x80509001

+
+

ERR_RELO_BAD_EHANDLE

+
+

0x80509003

+
+

ERR_RELO_KERNEL_NOT_LOADED

+
+

0x8050A001

+
+

ERR_MP_BADDB_OPEN

+
+

0x8050A002

+
+

ERR_MP_BADDB_HEADER

+
+

0x8050A003

+
+

ERR_MP_BADDB_OLDENGINE

+
+

0x8050A004

+
+

ERR_MP_BADDB_CONTENT

+
+

0x8050A005

+
+

ERR_MP_BADDB_NOTSIGNED

+
+

0x8050801

+
+

ERR_MP_REMOVE_FAILED

+
+

This is an internal error. It might be triggered when malware removal is not successful. +

+
+

0x80508018 +

+
+

ERR_MP_SCAN_ABORTED +

+
+

This is an internal error. It might have triggered when a scan fails to complete. +

+
## Related topics - [Configure Windows Defender in Windows 10](configure-windows-defender-in-windows-10.md) [Update and manage Windows Defender in Windows 10](get-started-with-windows-defender-for-windows-10.md) diff --git a/windows/manage/change-history-for-manage-and-update-windows-10.md b/windows/manage/change-history-for-manage-and-update-windows-10.md index 3d278c6dca..1f810b8340 100644 --- a/windows/manage/change-history-for-manage-and-update-windows-10.md +++ b/windows/manage/change-history-for-manage-and-update-windows-10.md @@ -13,6 +13,30 @@ author: jdeckerMS This topic lists new and updated topics in the [Manage and update Windows 10](index.md) documentation for [Windows 10 and Windows 10 Mobile](../index.md). +## April 2016 + + + ++++ + + + + + + + + + + + + +
New or changed topicDescription
[Configure telemetry and other settings in your organization](disconnect-your-organization-from-microsoft.md)

Added the font streaming section.

+ +  + ## March 2016 @@ -40,14 +64,6 @@ This topic lists new and updated topics in the [Manage and update Windows 10](in [Cortana integration in your business or enterprise](manage-cortana-in-enterprise.md))

Updated to include the new Preview feature, Cortana and Microsoft Dynamics CRM integration.

- -[Configure telemetry in your organization](../manage/configure-telemetry-in-your-organization.md) -

Updated to include Windows Server 2016 Technical Preview.

- - -[Disconnect from Microsoft and configure privacy settings in your organization](disconnect-your-organization-from-microsoft.md) -

Removed the telemetry content into its own topic.

- diff --git a/windows/manage/disconnect-your-organization-from-microsoft.md b/windows/manage/disconnect-your-organization-from-microsoft.md index 382645c7a1..988c57fa29 100644 --- a/windows/manage/disconnect-your-organization-from-microsoft.md +++ b/windows/manage/disconnect-your-organization-from-microsoft.md @@ -45,91 +45,93 @@ Here's what's covered in this article: - [3. Device metadata retrieval](#bkmk-devinst) - - [4. Insider Preview builds](#bkmk-previewbuilds) + - [4. Font streaming](#font-streaming) - - [5. Internet Explorer](#bkmk-ie) + - [5. Insider Preview builds](#bkmk-previewbuilds) - - [5.1 Internet Explorer Group Policies](#bkmk-ie-gp) + - [6. Internet Explorer](#bkmk-ie) - - [5.2 ActiveX control blocking](#bkmk-ie-activex) + - [6.1 Internet Explorer Group Policies](#bkmk-ie-gp) - - [6. Mail synchronization](#bkmk-mailsync) + - [6.2 ActiveX control blocking](#bkmk-ie-activex) - - [7. Microsoft Edge](#bkmk-edge) + - [7. Mail synchronization](#bkmk-mailsync) - - [7.1 Microsoft Edge Group Policies](#bkmk-edgegp) + - [8. Microsoft Edge](#bkmk-edge) - - [7.2 Microsoft Edge MDM policies](#bkmk-edge-mdm) + - [8.1 Microsoft Edge Group Policies](#bkmk-edgegp) - - [7.3 Microsoft Edge Windows Provisioning](#bkmk-edge-prov) + - [8.2 Microsoft Edge MDM policies](#bkmk-edge-mdm) - - [8. Network Connection Status Indicator](#bkmk-ncsi) + - [8.3 Microsoft Edge Windows Provisioning](#bkmk-edge-prov) - - [9. Offline maps](#bkmk-offlinemaps) + - [9. Network Connection Status Indicator](#bkmk-ncsi) - - [10. OneDrive](#bkmk-onedrive) + - [10. Offline maps](#bkmk-offlinemaps) - - [11. Preinstalled apps](#bkmk-preinstalledapps) + - [11. OneDrive](#bkmk-onedrive) - - [12. Settings > Privacy](#bkmk-settingssection) + - [12. Preinstalled apps](#bkmk-preinstalledapps) - - [12.1 General](#bkmk-general) + - [13. Settings > Privacy](#bkmk-settingssection) - - [12.2 Location](#bkmk-priv-location) + - [13.1 General](#bkmk-general) - - [12.3 Camera](#bkmk-priv-camera) + - [13.2 Location](#bkmk-priv-location) - - [12.4 Microphone](#bkmk-priv-microphone) + - [13.3 Camera](#bkmk-priv-camera) - - [12.5 Speech, inking, & typing](#bkmk-priv-speech) + - [13.4 Microphone](#bkmk-priv-microphone) - - [12.6 Account info](#bkmk-priv-accounts) + - [13.5 Speech, inking, & typing](#bkmk-priv-speech) - - [12.7 Contacts](#bkmk-priv-contacts) + - [13.6 Account info](#bkmk-priv-accounts) - - [12.8 Calendar](#bkmk-priv-calendar) + - [13.7 Contacts](#bkmk-priv-contacts) - - [12.9 Call history](#bkmk-priv-callhistory) + - [13.8 Calendar](#bkmk-priv-calendar) - - [12.10 Email](#bkmk-priv-email) + - [13.9 Call history](#bkmk-priv-callhistory) - - [12.11 Messaging](#bkmk-priv-messaging) + - [13.10 Email](#bkmk-priv-email) - - [12.12 Radios](#bkmk-priv-radios) + - [13.11 Messaging](#bkmk-priv-messaging) - - [12.13 Other devices](#bkmk-priv-other-devices) + - [13.12 Radios](#bkmk-priv-radios) - - [12.14 Feedback & diagnostics](#bkmk-priv-feedback) + - [13.13 Other devices](#bkmk-priv-other-devices) - - [12.15 Background apps](#bkmk-priv-background) + - [13.14 Feedback & diagnostics](#bkmk-priv-feedback) - - [13. Software Protection Platform](#bkmk-spp) + - [13.15 Background apps](#bkmk-priv-background) - - [14. Sync your settings](#bkmk-syncsettings) + - [14. Software Protection Platform](#bkmk-spp) - - [15. Teredo](#bkmk-teredo) + - [15. Sync your settings](#bkmk-syncsettings) - - [16. Wi-Fi Sense](#bkmk-wifisense) + - [16. Teredo](#bkmk-teredo) - - [17. Windows Defender](#bkmk-defender) + - [17. Wi-Fi Sense](#bkmk-wifisense) - - [18. Windows Media Player](#bkmk-wmp) + - [18. Windows Defender](#bkmk-defender) - - [19. Windows spotlight](#bkmk-spotlight) + - [19. Windows Media Player](#bkmk-wmp) - - [20. Windows Store](#bkmk-windowsstore) + - [20. Windows spotlight](#bkmk-spotlight) - - [21. Windows Update Delivery Optimization](#bkmk-updates) + - [21. Windows Store](#bkmk-windowsstore) - - [21.1 Settings > Update & security](#bkmk-wudo-ui) + - [22. Windows Update Delivery Optimization](#bkmk-updates) - - [21.2 Delivery Optimization Group Policies](#bkmk-wudo-gp) + - [22.1 Settings > Update & security](#bkmk-wudo-ui) - - [21.3 Delivery Optimization MDM policies](#bkmk-wudo-mdm) + - [22.2 Delivery Optimization Group Policies](#bkmk-wudo-gp) - - [21.4 Delivery Optimization Windows Provisioning](#bkmk-wudo-prov) + - [22.3 Delivery Optimization MDM policies](#bkmk-wudo-mdm) - - [22. Windows Update](#bkmk-wu) + - [22.4 Delivery Optimization Windows Provisioning](#bkmk-wudo-prov) + + - [23. Windows Update](#bkmk-wu) - [Manage your telemetry settings](#bkmk-utc) @@ -201,43 +203,45 @@ The settings in this section assume you are using Windows 10, version 1511 (cur - [3. Device metadata retrieval](#bkmk-devinst) -- [4. Insider Preview builds](#bkmk-previewbuilds) +- [4. Font streaming](#font-streaming) -- [5. Internet Explorer](#bkmk-ie) +- [5. Insider Preview builds](#bkmk-previewbuilds) -- [6. Mail synchronization](#bkmk-mailsync) +- [6. Internet Explorer](#bkmk-ie) -- [7. Microsoft Edge](#bkmk-edge) +- [7. Mail synchronization](#bkmk-mailsync) -- [8. Network Connection Status Indicator](#bkmk-ncsi) +- [8. Microsoft Edge](#bkmk-edge) -- [9. Offline maps](#bkmk-offlinemaps) +- [9. Network Connection Status Indicator](#bkmk-ncsi) -- [10. OneDrive](#bkmk-onedrive) +- [10. Offline maps](#bkmk-offlinemaps) -- [11. Preinstalled apps](#bkmk-preinstalledapps) +- [11. OneDrive](#bkmk-onedrive) -- [12. Settings > Privacy](#bkmk-settingssection) +- [12. Preinstalled apps](#bkmk-preinstalledapps) -- [13. Software Protection Platform](#bkmk-spp) +- [13. Settings > Privacy](#bkmk-settingssection) -- [14. Sync your settings](#bkmk-syncsettings) +- [14. Software Protection Platform](#bkmk-spp) -- [15. Teredo](#bkmk-teredo) +- [15. Sync your settings](#bkmk-syncsettings) -- [16. Wi-Fi Sense](#bkmk-wifisense) +- [16. Teredo](#bkmk-teredo) -- [17. Windows Defender](#bkmk-defender) +- [17. Wi-Fi Sense](#bkmk-wifisense) -- [18. Windows Media Player](#bkmk-wmp) +- [18. Windows Defender](#bkmk-defender) -- [19. Windows spotlight](#bkmk-spotlight) +- [19. Windows Media Player](#bkmk-wmp) -- [20. Windows Store](#bkmk-windowsstore) +- [20. Windows spotlight](#bkmk-spotlight) -- [21. Windows Update](#bkmk-wu) +- [21. Windows Store](#bkmk-windowsstore) -- [22. Windows Update Delivery Optimization](#bkmk-updates) +- [22. Windows Update](#bkmk-wu) + +- [23. Windows Update Delivery Optimization](#bkmk-updates) See the following table for a summary of the management settings. For more info, see its corresponding section. @@ -372,7 +376,18 @@ You can prevent Windows from setting the time automatically. To prevent Windows from retrieving device metadata from the Internet, apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Device Installation** > **Prevent device metadata retrieval from the Internet**. -### 4. Insider Preview builds +### 4. Font streaming + +Starting with Windows 10, fonts that are included in Windows but that are not stored on the local device can be downloaded on demand. + +To turn off font streaming, create a REG\_DWORD registry setting called **DisableFontProviders** in **HKEY\_LOCAL\_MACHINE\\System\\CurrentControlSet\\Services\\FontCache\\Parameters**, with a value of 1. + +**Note**   +This may change in future versions of Windows. + +  + +### 5. Insider Preview builds To turn off Insider Preview builds if you're running a released version of Windows 10. If you're running a preview version of Windows 10, you must roll back to a released version before you can turn off Insider Preview builds. @@ -402,11 +417,11 @@ To turn off Insider Preview builds if you're running a released version of Windo - **2**. (default) Not configured. Users can make their devices available for download and installing preview software. -### 5. Internet Explorer +### 6. Internet Explorer Use Group Policy to manage settings for Internet Explorer. -### 5.1 Internet Explorer Group Policies +### 6.1 Internet Explorer Group Policies Find the Internet Explorer Group Policy objects under **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Internet Explorer**. @@ -454,13 +469,13 @@ Find the Internet Explorer Group Policy objects under **Computer Configuration**   -### 5.2 ActiveX control blocking +### 6.2 ActiveX control blocking ActiveX control blocking periodically downloads a new list of out-of-date ActiveX controls that should be blocked. You can turn this off by changing the REG\_DWORD registry setting **HKEY\_CURRENT\_USER\\Software\\Microsoft\\Internet Explorer\\VersionManager\\DownloadVersionList** to 0 (zero). For more info, see [Out-of-date ActiveX control blocking](http://technet.microsoft.com/library/dn761713.aspx). -### 6. Mail synchronization +### 7. Mail synchronization To turn off mail synchronization for Microsoft Accounts that are configured on a device: @@ -478,11 +493,11 @@ To turn off the Windows Mail app: - Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Windows Mail** > **Turn off Windows Mail application** -### 7. Microsoft Edge +### 8. Microsoft Edge Use either Group Policy or MDM policies to manage settings for Microsoft Edge. For more info, see [Microsoft Edge and privacy: FAQ](http://go.microsoft.com/fwlink/p/?LinkId=730682). -### 7.1 Microsoft Edge Group Policies +### 8.1 Microsoft Edge Group Policies Find the Microsoft Edge Group Policy objects under **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Edge**. @@ -543,7 +558,7 @@ The Microsoft Edge Group Policy names were changed in Windows 10, version 1511.   -### 7.2 Microsoft Edge MDM policies +### 8.2 Microsoft Edge MDM policies The following Microsoft Edge MDM policies are available in the [Policy CSP](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx). @@ -589,13 +604,13 @@ The following Microsoft Edge MDM policies are available in the [Policy CSP](http   -### 7.3 Microsoft Edge Windows Provisioning +### 8.3 Microsoft Edge Windows Provisioning Use Windows ICD to create a provisioning package with the settings for these policies, go to **Runtime settings** > **Policies**. For a complete list of the Microsoft Edge policies, see [Available policies for Microsoft Edge](http://technet.microsoft.com/library/mt270204.aspx). -### 8. Network Connection Status Indicator +### 9. Network Connection Status Indicator Network Connection Status Indicator (NCSI) detects Internet connectivity and corporate network connectivity status. NCSI sends a DNS request and HTTP query to http://www.msftncsi.com to determine if the device can communicate with the Internet. For more info about NCIS, see [The Network Connection Status Icon](http://blogs.technet.com/b/networking/archive/2012/12/20/the-network-connection-status-icon.aspx). @@ -603,7 +618,7 @@ You can turn off NCSI through Group Policy: - Enable the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Internet Communication Management** > **Internet Communication Settings** > **Turn off Windows Network Connectivity Status Indicator active tests** -### 9. Offline maps +### 10. Offline maps You can turn off the ability to download and update offline maps. @@ -613,13 +628,13 @@ You can turn off the ability to download and update offline maps. - Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Maps** > **Turn off Automatic Download and Update of Map Data** -### 10. OneDrive +### 11. OneDrive To turn off OneDrive in your organization: - Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **OneDrive** > **Prevent the usage of OneDrive for file storage** -### 11. Preinstalled apps +### 12. Preinstalled apps Some preinstalled apps get content before they are opened to ensure a great experience. You can remove these using the steps in this section. @@ -731,41 +746,41 @@ To remove the Get Skype app: Remove the app for the current user. From an elevated command prompt, run the following Windows PowerShell command: **Get-AppxPackage Microsoft.SkypeApp | Remove-AppxPackage** -### 12. Settings > Privacy +### 13. Settings > Privacy Use Settings > Privacy to configure some settings that may be important to your organization. Except for the Feedback & Diagnostics page, these settings must be configured for every user account that signs into the PC. -- [12.1 General](#bkmk-general) +- [13.1 General](#bkmk-general) -- [12.2 Location](#bkmk-priv-location) +- [13.2 Location](#bkmk-priv-location) -- [12.3 Camera](#bkmk-priv-camera) +- [13.3 Camera](#bkmk-priv-camera) -- [12.4 Microphone](#bkmk-priv-microphone) +- [13.4 Microphone](#bkmk-priv-microphone) -- [12.5 Speech, inking, & typing](#bkmk-priv-speech) +- [13.5 Speech, inking, & typing](#bkmk-priv-speech) -- [12.6 Account info](#bkmk-priv-accounts) +- [13.6 Account info](#bkmk-priv-accounts) -- [12.7 Contacts](#bkmk-priv-contacts) +- [13.7 Contacts](#bkmk-priv-contacts) -- [12.8 Calendar](#bkmk-priv-calendar) +- [13.8 Calendar](#bkmk-priv-calendar) -- [12.9 Call history](#bkmk-priv-callhistory) +- [13.9 Call history](#bkmk-priv-callhistory) -- [12.10 Email](#bkmk-priv-email) +- [13.10 Email](#bkmk-priv-email) -- [12.11 Messaging](#bkmk-priv-messaging) +- [13.11 Messaging](#bkmk-priv-messaging) -- [12.12 Radios](#bkmk-priv-radios) +- [13.12 Radios](#bkmk-priv-radios) -- [12.13 Other devices](#bkmk-priv-other-devices) +- [13.13 Other devices](#bkmk-priv-other-devices) -- [12.14 Feedback & diagnostics](#bkmk-priv-feedback) +- [13.14 Feedback & diagnostics](#bkmk-priv-feedback) -- [12.15 Background apps](#bkmk-priv-background) +- [13.15 Background apps](#bkmk-priv-background) -### 12.1 General +### 13.1 General **General** includes options that don't fall into other areas. @@ -837,7 +852,7 @@ To turn off **Let websites provide locally relevant content by accessing my lang - Create a new REG\_DWORD registry setting called **HttpAcceptLanguageOptOut** in **HKEY\_CURRENT\_USER\\Control Panel\\International\\User Profile**, with a value of 1. -### 12.2 Location +### 13.2 Location In the **Location** area, you choose whether devices have access to location-specific sensors and which apps have access to the device's location. @@ -890,7 +905,7 @@ To turn off **Choose apps that can use your location**: - Turn off each app using the UI. -### 12.3 Camera +### 13.3 Camera In the **Camera** area, you can choose which apps can access a device's camera. @@ -929,7 +944,7 @@ To turn off **Choose apps that can use your camera**: - Turn off the feature in the UI for each app. -### 12.4 Microphone +### 13.4 Microphone In the **Microphone** area, you can choose which apps can access a device's microphone. @@ -947,7 +962,7 @@ To turn off **Choose apps that can use your microphone**: - Turn off the feature in the UI for each app. -### 12.5 Speech, inking, & typing +### 13.5 Speech, inking, & typing In the **Speech, Inking, & Typing** area, you can let Windows and Cortana better understand your employee's voice and written input by sampling their voice and writing, and by comparing verbal and written input to contact names and calendar entrees. @@ -972,7 +987,7 @@ To turn off the functionality: Create a REG\_DWORD registry setting called **HarvestContacts** in **HKEY\_CURRENT\_USER\\SOFTWARE\\Microsoft\\InputPersonalization\\TrainedDataStore**, with a value of 0 (zero). -### 12.6 Account info +### 13.6 Account info In the **Account Info** area, you can choose which apps can access your name, picture, and other account info. @@ -990,7 +1005,7 @@ To turn off **Choose the apps that can access your account info**: - Turn off the feature in the UI for each app. -### 12.7 Contacts +### 13.7 Contacts In the **Contacts** area, you can choose which apps can access an employee's contacts list. @@ -1004,7 +1019,7 @@ To turn off **Choose apps that can access contacts**: - Set the **Select a setting** box to **Force Deny**. -### 12.8 Calendar +### 13.8 Calendar In the **Calendar** area, you can choose which apps have access to an employee's calendar. @@ -1022,7 +1037,7 @@ To turn off **Choose apps that can access calendar**: - Turn off the feature in the UI for each app. -### 12.9 Call history +### 13.9 Call history In the **Call history** area, you can choose which apps have access to an employee's call history. @@ -1036,7 +1051,7 @@ To turn off **Let apps access my call history**: - Set the **Select a setting** box to **Force Deny**. -### 12.10 Email +### 13.10 Email In the **Email** area, you can choose which apps have can access and send email. @@ -1050,7 +1065,7 @@ To turn off **Let apps access and send email**: - Set the **Select a setting** box to **Force Deny**. -### 12.11 Messaging +### 13.11 Messaging In the **Messaging** area, you can choose which apps can read or send messages. @@ -1068,7 +1083,7 @@ To turn off **Choose apps that can read or send messages**: - Turn off the feature in the UI for each app. -### 12.12 Radios +### 13.12 Radios In the **Radios** area, you can choose which apps can turn a device's radio on or off. @@ -1086,7 +1101,7 @@ To turn off **Choose apps that can control radios**: - Turn off the feature in the UI for each app. -### 12.13 Other devices +### 13.13 Other devices In the **Other Devices** area, you can choose whether devices that aren't paired to PCs, such as an Xbox One, can share and sync info. @@ -1104,7 +1119,7 @@ To turn off **Let your apps use your trusted devices (hardware you've already co - Set the **Select a setting** box to **Force Deny**. -### 12.14 Feedback & diagnostics +### 13.14 Feedback & diagnostics In the **Feedback & Diagnostics** area, you can choose how often you're asked for feedback and how much diagnostic and usage information is sent to Microsoft. @@ -1178,7 +1193,7 @@ To change the level of diagnostic and usage data sent when you **Send your devic - **3**. Maps to the [Full](#bkmk-utc-full) level. -### 12.15 Background apps +### 13.15 Background apps In the **Background Apps** area, you can choose which apps can run in the background. @@ -1186,7 +1201,7 @@ To turn off **Let apps run in the background**: - Turn off the feature in the UI for each app. -### 13. Software Protection Platform +### 14. Software Protection Platform Enterprise customers can manage their Windows activation status with volume licensing using an on-premise Key Management Server. You can opt out of sending KMS client activation data to Microsoft automatically by applying the following Group Policy: @@ -1194,7 +1209,7 @@ Enterprise customers can manage their Windows activation status with volume lice The Windows activation status will be valid for a rolling period of 180 days with weekly activation status checks to the KMS. -### 14. Sync your settings +### 15. Sync your settings You can control if your settings are synchronized: @@ -1220,13 +1235,13 @@ To turn off Messaging cloud sync: - Create a REG\_DWORD registry setting called **CloudServiceSyncEnabled** in **HKEY\_CURRENT\_USER\\SOFTWARE\\Microsoft\\Messaging**, with a value of 0 (zero). -### 15. Teredo +### 16. Teredo You can disable Teredo by using the netsh.exe command. For more info on Teredo, see [Internet Protocol Version 6, Teredo, and Related Technologies](http://technet.microsoft.com/library/cc722030.aspx). - From an elevated command prompt, run **netsh interface teredo set state disabled** -### 16. Wi-Fi Sense +### 17. Wi-Fi Sense Wi-Fi Sense automatically connects devices to known hotspots and to the wireless networks the person’s contacts have shared with them. @@ -1252,7 +1267,7 @@ To turn off **Connect to suggested open hotspots** and **Connect to networks sha When turned off, the Wi-Fi Sense settings still appear on the Wi-Fi Settings screen, but they’re non-functional and they can’t be controlled by the employee. -### 17. Windows Defender +### 18. Windows Defender You can opt of the Microsoft Antimalware Protection Service. @@ -1296,7 +1311,7 @@ You can stop downloading definition updates: You can also use the registry to turn off Malicious Software Reporting Tool telemetry by setting the REG\_DWORD value **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\MRT\\DontReportInfectionInformation** to 1. -### 18. Windows Media Player +### 19. Windows Media Player To remove Windows Media Player: @@ -1306,7 +1321,7 @@ To remove Windows Media Player: - Run the following DISM command from an elevated command prompt: **dism /online /Disable-Feature /FeatureName:WindowsMediaPlayer** -### 19. Windows spotlight +### 20. Windows spotlight Windows spotlight provides different background images and text on the lock screen. You can control it by using the user interface or through Group Policy. @@ -1337,13 +1352,13 @@ Windows spotlight provides different background images and text on the lock scre For more info, see [Windows spotlight on the lock screen](../whats-new/windows-spotlight.md). -### 20. Windows Store +### 21. Windows Store You can turn off the ability to launch apps from the Windows Store that were preinstalled or downloaded. This will also turn off automatic app updates, and the Windows Store will be disabled. - Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Store** > **Disable all apps from Windows Store**. -### 21. Windows Update Delivery Optimization +### 22. Windows Update Delivery Optimization Windows Update Delivery Optimization lets you get Windows updates and Windows Store apps from sources in addition to Microsoft, which not only helps when you have a limited or unreliable Internet connection, but can also help you reduce the amount of bandwidth needed to keep all of your organization’s PCs up-to-date. If you have Delivery Optimization turned on, PCs on your network may send and receive updates and apps to other PCs on your local network, if you choose, or to PCs on the Internet. @@ -1351,13 +1366,13 @@ By default, PCs running Windows 10 Enterprise and Windows 10 Education will on Use the UI, Group Policy, MDM policies, or Windows Provisioning to set up Delivery Optimization. -### 21.1 Settings > Update & security +### 22.1 Settings > Update & security You can set up Delivery Optimization from the **Settings** UI. - Go to **Settings** > **Update & security** > **Windows Update** > **Advanced options** > **Choose how updates are delivered**. -### 21.2 Delivery Optimization Group Policies +### 22.2 Delivery Optimization Group Policies You can find the Delivery Optimization Group Policy objects under **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Delivery Optimization**. @@ -1414,7 +1429,7 @@ You can find the Delivery Optimization Group Policy objects under **Computer Con   -### 21.3 Delivery Optimization MDM policies +### 22.3 Delivery Optimization MDM policies The following Delivery Optimization MDM policies are available in the [Policy CSP](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx). @@ -1471,7 +1486,7 @@ The following Delivery Optimization MDM policies are available in the [Policy CS   -### 21.4 Delivery Optimization Windows Provisioning +### 22.4 Delivery Optimization Windows Provisioning If you don't have an MDM server in your enterprise, you can use Windows Provisioning to configure the Delivery Optimization policies @@ -1487,7 +1502,7 @@ Use Windows ICD, included with the [Windows Assessment and Deployment Kit (Windo For more info about Delivery Optimization in general, see [Windows Update Delivery Optimization: FAQ](http://go.microsoft.com/fwlink/p/?LinkId=730684). -### 22. Windows Update +### 23. Windows Update You can turn off Windows Update by setting the following registry entries: diff --git a/windows/manage/images/settings-table.png b/windows/manage/images/settings-table.png index 4a650114d4..1a4aff8def 100644 Binary files a/windows/manage/images/settings-table.png and b/windows/manage/images/settings-table.png differ diff --git a/windows/manage/introduction-to-windows-10-servicing.md b/windows/manage/introduction-to-windows-10-servicing.md index e6837458dd..3de0e4c19f 100644 --- a/windows/manage/introduction-to-windows-10-servicing.md +++ b/windows/manage/introduction-to-windows-10-servicing.md @@ -286,51 +286,91 @@ Windows 10 Enterprise LTSB does include Internet Explorer 11, and is compatible Table 2. Servicing option summary -Comparison -Windows 10 servicing options -Current Branch (CB) -Current Branch for Business (CBB) -Long-Term Servicing Branch (LTSB) -**Availability of new feature upgrades for installation** -Immediate -Deferred by ~4 months -Not applicable -**Supported editions** -Windows 10 Home, Windows 10 Pro, Windows 10 Education, Windows 10 Enterprise, Windows 10 Mobile, IoT Core, IoT Core Pro -Windows 10 Pro, Windows 10 Education, Windows 10 Enterprise, Windows 10 Mobile Enterprise, IoT Core Pro -Windows 10 Enterprise LTSB -**Minimum length of servicing lifetime** -Approximately 4 Months -Approximately 8 months -10 years -**Ongoing installation of new feature upgrades required to receive servicing updates** -Yes -Yes -No -**Supports Windows Update for release deployment** -Yes -Yes -Yes -**Supports Windows Server Update Services for release deployment** -Yes (excludes Home) -Yes -Yes -**Supports Configuration Manager/configuration management systems for release deployment** -Yes (excludes Home) -Yes -Yes -**First party browsers included** -Microsoft Edge, Internet Explorer 11 -Microsoft Edge, IE11 -IE11 -**Notable Windows system apps removed** -None -None -Microsoft Edge, Windows Store Client, Cortana (limited search available) -**Notable Windows universal apps removed** -None -None -Outlook Mail/Calendar, OneNote, Weather, News, Sports, Money, Photos, Camera, Music, Clock + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ComparisonWindows 10 servicing options
Current Branch (CB)Current Branch for Business (CBB)Long-Term Servicing Branch (LTSB)
Availability of new feature upgrades for installationImmediateDeferred by ~4 monthsNot applicable
Supported editionsWindows 10 Home, Windows 10 Pro, Windows 10 Education, Windows 10 Enterprise, Windows 10 Mobile, +IoT Core, IoT Core ProWindows 10 Pro, +Windows 10 Education, +Windows 10 Enterprise, Windows 10 Mobile Enterprise, +IoT Core ProWindows 10 Enterprise LTSB
Minimum length of servicing lifetimeApproximately 4 MonthsApproximately 8 months10 years
Ongoing installation of new feature upgrades required to receive servicing updatesYesYesNo
Supports Windows Update for release deploymentYesYesYes
Supports Windows Server Update Services for release deploymentYes +(excludes Home) +YesYes
Supports Configuration Manager/configuration management systems for release deploymentYes +(excludes Home) +YesYes
First party browsers includedMicrosoft Edge, +Internet Explorer 11Microsoft Edge, +IE11IE11
Notable Windows +system apps removed +NoneNoneMicrosoft Edge, Windows Store Client, Cortana (limited search available)
Notable Windows +universal apps removed +NoneNoneOutlook Mail/Calendar, OneNote, Weather, News, Sports, Money, Photos, Camera, Music, Clock
  ## Related topics diff --git a/windows/plan/setup-and-deployment.md b/windows/plan/setup-and-deployment.md index f52da706cb..a023b39573 100644 --- a/windows/plan/setup-and-deployment.md +++ b/windows/plan/setup-and-deployment.md @@ -34,27 +34,62 @@ To use Windows Update for Business, Windows 10-based devices must first be conf Windows Update for Business allows administrators to control when upgrades and updates are deployed to their Windows 10 clients by specifying deferral windows from when they are initially made available on the Windows Update service. As mentioned, there are restrictions as to how long you can delay upgrades and updates. The following table details these restrictions, per deployment category type: -**Group Policy keys** + + + + + + + + + + + + + + + +
+

Group Policy keys

+
+

HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\DeferUpgradePeriod

+
    +
  • +

    Values: 0-8 where each unit for upgrade is a month -HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate\\DeferUpgradePeriod - -- Values: 0-8 where each unit for upgrade is a month - -HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate\\DeferUpdatePeriod - -- Values: 0-4 where each unit for update is a week - -**MDM** - -*./Vendor/MSFT/Update/DeferUpgrade* - -Software\\Microsoft\\PolicyManager\\current\\Update\\RequireDeferUpgrade - -- Values: 0-8 where each unit for upgrade is a month - -Software\\Microsoft\\PolicyManager\\current\\Update\\RequireDeferUpdate - -- Values: 0-4 where each unit for update is a week +

    +
  • +
+
+

HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\DeferUpdatePeriod

+
    +
  • +

    Values: 0-4 where each unit for update is a week +

    +
  • +
+
+

MDM

+

./Vendor/MSFT/Update/DeferUpgrade

+
+

Software\Microsoft\PolicyManager\current\Update\RequireDeferUpgrade +

+
    +
  • +

    Values: 0-8 where each unit for upgrade is a month + +

    +
  • +
+
+

Software\Microsoft\PolicyManager\current\Update\RequireDeferUpdate

+
    +
  • +

    Values: 0-4 where each unit for update is a week +

    +
  • +
+
  diff --git a/windows/plan/windows-update-for-business.md b/windows/plan/windows-update-for-business.md index 21bb74847f..b936f37735 100644 --- a/windows/plan/windows-update-for-business.md +++ b/windows/plan/windows-update-for-business.md @@ -65,31 +65,44 @@ In Windows 10, Windows Update for Business recognizes three deployment categori Both upgrades and updates can be deferred from deployment to client machines by a Windows Update for Business administrator within a bounded rage of time from when those updates are first made available on the Windows Update service. This deferral capability allows administrators to validate deployments as they are pushed to all their Windows Update for Business enrolled clients. The following table defines maximum deferral periods allowed by deployment type: -Category -Maximum deferral -Deferral increments -Classification type -Classification GUID -OS upgrades -8 months -1 month -Upgrade -3689BDC8-B205-4AF4-8D4A-A63924C5E9D5 -OS updates -4 weeks -1 week -Security updates -0FA1201D-4330-4FA8-8AE9-B877473B6441 -Drivers -EBFC1FC5-71A4-4F7B-9ACA-3B9A503104A0 -Updates -CD5FFD1E-E932-4E3A-BF74-18BF0B1BBD83 -Other/non-deferrable -No deferral -No deferral -Definition updates -E0789628-CE08-4437-BE74-2495B842F43B -  + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
CategoryMaximum deferralDeferral incrementsClassification typeClassification GUID
OS upgrades8 months1 monthUpgrade3689BDC8-B205-4AF4-8D4A-A63924C5E9D5
OS updates4 weeks1 weekSecurity updates0FA1201D-4330-4FA8-8AE9-B877473B6441
DriversEBFC1FC5-71A4-4F7B-9ACA-3B9A503104A0
UpdatesCD5FFD1E-E932-4E3A-BF74-18BF0B1BBD83
Other/non-deferrableNo deferralNo deferralDefinition updatesE0789628-CE08-4437-BE74-2495B842F43B
## Related topics diff --git a/windows/whats-new/edp-whats-new-overview.md b/windows/whats-new/edp-whats-new-overview.md index d5a8f8ca05..42588317fd 100644 --- a/windows/whats-new/edp-whats-new-overview.md +++ b/windows/whats-new/edp-whats-new-overview.md @@ -12,7 +12,7 @@ author: TrudyHa # Enterprise data protection (EDP) overview -\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows SDK Insider Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] +\[Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. An app that calls an API introduced in Windows 10 Anniversary SDK Preview Build 14295 cannot be ingested into the Windows Store during the Preview period.\] With the increase of employee-owned devices in the enterprise, there’s also an increasing risk of accidental data disclosure through apps and services that are outside of the enterprise’s control like email, social media, and the public cloud.