diff --git a/windows/keep-secure/WDAV-working/images/defender/client.png b/windows/keep-secure/WDAV-working/images/defender/client.png deleted file mode 100644 index 4f2118206e..0000000000 Binary files a/windows/keep-secure/WDAV-working/images/defender/client.png and /dev/null differ diff --git a/windows/keep-secure/WDAV-working/images/defender/detection-source.png b/windows/keep-secure/WDAV-working/images/defender/detection-source.png deleted file mode 100644 index 7d471dc22d..0000000000 Binary files a/windows/keep-secure/WDAV-working/images/defender/detection-source.png and /dev/null differ diff --git a/windows/keep-secure/WDAV-working/images/defender/download-wdo.png b/windows/keep-secure/WDAV-working/images/defender/download-wdo.png deleted file mode 100644 index 50d2fc3152..0000000000 Binary files a/windows/keep-secure/WDAV-working/images/defender/download-wdo.png and /dev/null differ diff --git a/windows/keep-secure/WDAV-working/images/defender/enhanced-notifications.png b/windows/keep-secure/WDAV-working/images/defender/enhanced-notifications.png deleted file mode 100644 index 8317458416..0000000000 Binary files a/windows/keep-secure/WDAV-working/images/defender/enhanced-notifications.png and /dev/null differ diff --git a/windows/keep-secure/WDAV-working/images/defender/gp.png b/windows/keep-secure/WDAV-working/images/defender/gp.png deleted file mode 100644 index 8b57c7b45c..0000000000 Binary files a/windows/keep-secure/WDAV-working/images/defender/gp.png and /dev/null differ diff --git a/windows/keep-secure/WDAV-working/images/defender/notification.png b/windows/keep-secure/WDAV-working/images/defender/notification.png deleted file mode 100644 index cad9f162e9..0000000000 Binary files a/windows/keep-secure/WDAV-working/images/defender/notification.png and /dev/null differ diff --git a/windows/keep-secure/WDAV-working/images/defender/quarantine.png b/windows/keep-secure/WDAV-working/images/defender/quarantine.png deleted file mode 100644 index 6a908aedec..0000000000 Binary files a/windows/keep-secure/WDAV-working/images/defender/quarantine.png and /dev/null differ diff --git a/windows/keep-secure/WDAV-working/images/defender/sccm-wdo.png b/windows/keep-secure/WDAV-working/images/defender/sccm-wdo.png deleted file mode 100644 index 8f504b94e1..0000000000 Binary files a/windows/keep-secure/WDAV-working/images/defender/sccm-wdo.png and /dev/null differ diff --git a/windows/keep-secure/WDAV-working/images/defender/settings-wdo.png b/windows/keep-secure/WDAV-working/images/defender/settings-wdo.png deleted file mode 100644 index 23412856b0..0000000000 Binary files a/windows/keep-secure/WDAV-working/images/defender/settings-wdo.png and /dev/null differ diff --git a/windows/keep-secure/WDAV-working/images/defender/ux-config-key.png b/windows/keep-secure/WDAV-working/images/defender/ux-config-key.png deleted file mode 100644 index 3e2d966342..0000000000 Binary files a/windows/keep-secure/WDAV-working/images/defender/ux-config-key.png and /dev/null differ diff --git a/windows/keep-secure/WDAV-working/images/defender/ux-uilockdown-key.png b/windows/keep-secure/WDAV-working/images/defender/ux-uilockdown-key.png deleted file mode 100644 index 86d1b4b249..0000000000 Binary files a/windows/keep-secure/WDAV-working/images/defender/ux-uilockdown-key.png and /dev/null differ diff --git a/windows/keep-secure/WDAV-working/troubleshoot-windows-defender-in-windows-10.md b/windows/keep-secure/WDAV-working/troubleshoot-windows-defender-in-windows-10.md deleted file mode 100644 index 7828f0b3e5..0000000000 --- a/windows/keep-secure/WDAV-working/troubleshoot-windows-defender-in-windows-10.md +++ /dev/null @@ -1,16 +0,0 @@ ---- -title: Troubleshoot Windows Defender in Windows 10 (Windows 10) -description: IT professionals can review information about event IDs in Windows Defender for Windows 10 and see any relevant action they can take. -ms.assetid: EE488CC1-E340-4D47-B50B-35BD23CB4D70 -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.pagetype: security -localizationpriority: medium -author: jasesso -redirect_url: /troubleshoot-windows-defender-antivirus/ ---- - -# Troubleshoot Windows Defender in Windows 10 - -This page has been redirected to *Troubleshoot Windows Defender Antivirus*. \ No newline at end of file diff --git a/windows/keep-secure/WDAV-working/windows-defender-antivirus-in-windows-10.md b/windows/keep-secure/WDAV-working/windows-defender-antivirus-in-windows-10.md deleted file mode 100644 index b9a36aabbc..0000000000 --- a/windows/keep-secure/WDAV-working/windows-defender-antivirus-in-windows-10.md +++ /dev/null @@ -1,74 +0,0 @@ ---- -title: Windows Defender Antivirus -description: Learn how to manage, configure, and use Windows Defender AV, the built-in antimalware and antivirus product available in Windows 10. -keywords: windows defender antivirus, windows defender, antimalware, scep, system center endpoint protection, system center configuration manager, virus, malware, threat, detection, protection, security -ms.assetid: 6A9EB85E-1F3A-40AC-9A47-F44C4A2B55E2 -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.pagetype: security -localizationpriority: medium -author: iaanw ---- - -# Windows Defender Antivirus in Windows 10 - -**Applies to** -- Windows 10 - -Windows Defender Antivirus is a built-in antimalware solution that provides security and antimalware management for desktops, portable computers, and servers. - -This library of documentation is aimed for enterprise security administrators who are either considering deployment, or have already deployed and are wanting to manage and configure Windows Defender AV on PC endpoints in their network. - -For more important information about running Windows Defender on a server platform, see [Windows Defender Overview for Windows Server](https://technet.microsoft.com/library/dn765478.aspx). - -## What's new in Windows 10, version 1703 - -New features for Windows Defender AV in Windows 10, version 1703 include: -- [Updates to how the Block at First Sight feature can be configured](configure-block-at-first-sight-windows-defender-antivirus.md) -- [The ability to specify the level of cloud-protection](specify-cloud-protection-level-windows-defender-antivirus.md) -- [Windows Defender Antivirus protection in the Windows Defender Security Center app](windows-defender-security-center-antivirus.md) - -We've expanded this documentation library to cover end-to-end deployment, management, and configuration for Windows Defender AV, and we've added some new guides that can help with evaluating and deploying Windows Defender AV in certain scenarios: -- [Evaluation guide for Windows Defender AV](evaluate-windows-defender-antivirus.md) -- [Deployment guide for Windows Defender AV in a virtual desktop infrastructure environment](deployment-vdi-windows-defender-antivirus.md) - -See the [In this library](#in-this-library) list at the end of this topic for links to each of the updated sections in this library. - - -## Minimum system requirements - -Windows Defender has the same hardware requirements as Windows 10. For more information, see: -- [Minimum hardware requirements](https://msdn.microsoft.com/library/windows/hardware/dn915086.aspx) -- [Hardware component guidelines](https://msdn.microsoft.com/library/windows/hardware/dn915049.aspx) - - -Some features require a certain version of Windows 10 - the minimum version required is specified at the top of each topic. - -## Compatibility with Windows Defender Advanced Threat Protection - -Windows Defender Advanced Threat Protection (ATP) is an additional service that helps enterprises to detect, investigate, and respond to advanced persistent threats on their network. - -See the [Windows Defender Advanced Threat Protection](windows-defender-advanced-threat-protection.md) topics for more information about the service. - -If you are enrolled in Windows Defender ATP, and you are not using Windows Defender as your real-time protection service on your endpoints, Windows Defender will automatically enter into a passive mode. - -In passive mode, Windows Defender will continue to run (using the *msmpeng.exe* process), and will continue to be updated, however there will be no Windows Defender user interface, scheduled scans won’t run, and Windows Defender will not provide real-time protection from malware. - -You can still [manage updates for Windows Defender](manage-updates-baselines-windows-defender-antivirus.md), however you can't move Windows Defender into the normal active mode if your endpoints have an up-to-date third-party product providing real-time protection from malware. - -If you uninstall the other product, and choose to use Windows Defender to provide protection to your endpoints, Windows Defender will automatically return to its normal active mode. - - -  -## In this library - -Topic | Description -:---|:--- -[Evaluate Windows Defender Antivirus protection](evaluate-windows-defender-antivirus.md) | Evaluate the protection capabilities of Windows Defender Antivirus with a specialized evaluation guide and powershell script. -[Deploy, manage updates, and report on Windows Defender Antivirus](deploy-manage-report-windows-defender-antivirus.md) | While traditional client deployment is not required for Windows Defender AV, you will need to enable the service. You can also manage how protection and product updates are applies, and receive reports from Configuration Manager, Intune, and with some security information and event monitoring (SIEM) tools. -[Configure Windows Defender features](configure-windows-defender-antivirus-features.md) | Windows Defender AV has a large set of configurable features and options. You can use a number of management tools, including Group Policy, System Center Configuration Manager, Microsoft Intune, PowerShell cmdlets, and Windows Management Instrumentation (WMI). You can configure options such as cloud-delivered protection, always-on monitoring and scanning, and how end-users can interact or override global policy settings. -[Customize, initiate, and review the results of scans and remediation](customize-run-review-remediate-scans-windows-defender-antivirus.md) | You can set up scheduled scans, run on-demand scans, and configure how remediation works when threats are detected. -[Troubleshoot Windows Defender in Windows 10](troubleshoot-windows-defender-antivirus.md)|Review event IDs in Windows Defender Antivirus and take the appropriate actions. -[Reference topics for management and configuration tools](configuration-management-reference-windows-defender-antivirus.md)|The management and configuration tools that you can use with Windows Defender AV are listed and described here. - diff --git a/windows/keep-secure/WDAV-working/command-line-arguments-windows-defender-antivirus.md b/windows/keep-secure/command-line-arguments-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/command-line-arguments-windows-defender-antivirus.md rename to windows/keep-secure/command-line-arguments-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/configuration-management-reference-windows-defender-antivirus.md b/windows/keep-secure/configuration-management-reference-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/configuration-management-reference-windows-defender-antivirus.md rename to windows/keep-secure/configuration-management-reference-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/configure-advanced-scan-types-windows-defender-antivirus.md b/windows/keep-secure/configure-advanced-scan-types-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/configure-advanced-scan-types-windows-defender-antivirus.md rename to windows/keep-secure/configure-advanced-scan-types-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/configure-block-at-first-sight-windows-defender-antivirus.md b/windows/keep-secure/configure-block-at-first-sight-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/configure-block-at-first-sight-windows-defender-antivirus.md rename to windows/keep-secure/configure-block-at-first-sight-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/configure-cloud-block-timeout-period-windows-defender-antivirus.md b/windows/keep-secure/configure-cloud-block-timeout-period-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/configure-cloud-block-timeout-period-windows-defender-antivirus.md rename to windows/keep-secure/configure-cloud-block-timeout-period-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/configure-end-user-interaction-windows-defender-antivirus.md b/windows/keep-secure/configure-end-user-interaction-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/configure-end-user-interaction-windows-defender-antivirus.md rename to windows/keep-secure/configure-end-user-interaction-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/configure-exclusions-windows-defender-antivirus.md b/windows/keep-secure/configure-exclusions-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/configure-exclusions-windows-defender-antivirus.md rename to windows/keep-secure/configure-exclusions-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/configure-local-policy-overrides-windows-defender-antivirus.md b/windows/keep-secure/configure-local-policy-overrides-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/configure-local-policy-overrides-windows-defender-antivirus.md rename to windows/keep-secure/configure-local-policy-overrides-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/configure-network-connections-windows-defender-antivirus.md b/windows/keep-secure/configure-network-connections-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/configure-network-connections-windows-defender-antivirus.md rename to windows/keep-secure/configure-network-connections-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/configure-notifications-windows-defender-antivirus.md b/windows/keep-secure/configure-notifications-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/configure-notifications-windows-defender-antivirus.md rename to windows/keep-secure/configure-notifications-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/configure-protection-features-windows-defender-antivirus.md b/windows/keep-secure/configure-protection-features-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/configure-protection-features-windows-defender-antivirus.md rename to windows/keep-secure/configure-protection-features-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/configure-real-time-protection-windows-defender-antivirus.md b/windows/keep-secure/configure-real-time-protection-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/configure-real-time-protection-windows-defender-antivirus.md rename to windows/keep-secure/configure-real-time-protection-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/configure-remediation-windows-defender-antivirus.md b/windows/keep-secure/configure-remediation-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/configure-remediation-windows-defender-antivirus.md rename to windows/keep-secure/configure-remediation-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/configure-windows-defender-antivirus-features.md b/windows/keep-secure/configure-windows-defender-antivirus-features.md similarity index 100% rename from windows/keep-secure/WDAV-working/configure-windows-defender-antivirus-features.md rename to windows/keep-secure/configure-windows-defender-antivirus-features.md diff --git a/windows/keep-secure/WDAV-working/configure-windows-defender-in-windows-10.md b/windows/keep-secure/configure-windows-defender-in-windows-10.md similarity index 100% rename from windows/keep-secure/WDAV-working/configure-windows-defender-in-windows-10.md rename to windows/keep-secure/configure-windows-defender-in-windows-10.md diff --git a/windows/keep-secure/WDAV-working/customize-run-review-remediate-scans-windows-defender-antivirus.md b/windows/keep-secure/customize-run-review-remediate-scans-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/customize-run-review-remediate-scans-windows-defender-antivirus.md rename to windows/keep-secure/customize-run-review-remediate-scans-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/deploy-manage-report-windows-defender-antivirus.md b/windows/keep-secure/deploy-manage-report-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/deploy-manage-report-windows-defender-antivirus.md rename to windows/keep-secure/deploy-manage-report-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/deploy-windows-defender-antivirus.md b/windows/keep-secure/deploy-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/deploy-windows-defender-antivirus.md rename to windows/keep-secure/deploy-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/deployment-vdi-windows-defender-antivirus.md b/windows/keep-secure/deployment-vdi-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/deployment-vdi-windows-defender-antivirus.md rename to windows/keep-secure/deployment-vdi-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md b/windows/keep-secure/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md rename to windows/keep-secure/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/enable-cloud-protection-windows-defender-antivirus.md b/windows/keep-secure/enable-cloud-protection-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/enable-cloud-protection-windows-defender-antivirus.md rename to windows/keep-secure/enable-cloud-protection-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/enable-pua-windows-defender-for-windows-10.md b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md similarity index 100% rename from windows/keep-secure/WDAV-working/enable-pua-windows-defender-for-windows-10.md rename to windows/keep-secure/enable-pua-windows-defender-for-windows-10.md diff --git a/windows/keep-secure/WDAV-working/evaluate-windows-defender-antivirus.md b/windows/keep-secure/evaluate-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/evaluate-windows-defender-antivirus.md rename to windows/keep-secure/evaluate-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/get-started-with-windows-defender-for-windows-10.md b/windows/keep-secure/get-started-with-windows-defender-for-windows-10.md similarity index 100% rename from windows/keep-secure/WDAV-working/get-started-with-windows-defender-for-windows-10.md rename to windows/keep-secure/get-started-with-windows-defender-for-windows-10.md diff --git a/windows/keep-secure/WDAV-working/images/defender/order-update-sources-wdav.png b/windows/keep-secure/images/defender/order-update-sources-wdav.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/order-update-sources-wdav.png rename to windows/keep-secure/images/defender/order-update-sources-wdav.png diff --git a/windows/keep-secure/WDAV-working/images/defender/wdav-bafs-edge.png b/windows/keep-secure/images/defender/wdav-bafs-edge.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/wdav-bafs-edge.png rename to windows/keep-secure/images/defender/wdav-bafs-edge.png diff --git a/windows/keep-secure/WDAV-working/images/defender/wdav-bafs-ie.png b/windows/keep-secure/images/defender/wdav-bafs-ie.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/wdav-bafs-ie.png rename to windows/keep-secure/images/defender/wdav-bafs-ie.png diff --git a/windows/keep-secure/WDAV-working/images/defender/wdav-extension-exclusions.png b/windows/keep-secure/images/defender/wdav-extension-exclusions.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/wdav-extension-exclusions.png rename to windows/keep-secure/images/defender/wdav-extension-exclusions.png diff --git a/windows/keep-secure/WDAV-working/images/defender/wdav-headless-mode-1607.png b/windows/keep-secure/images/defender/wdav-headless-mode-1607.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/wdav-headless-mode-1607.png rename to windows/keep-secure/images/defender/wdav-headless-mode-1607.png diff --git a/windows/keep-secure/WDAV-working/images/defender/wdav-headless-mode-1703.png b/windows/keep-secure/images/defender/wdav-headless-mode-1703.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/wdav-headless-mode-1703.png rename to windows/keep-secure/images/defender/wdav-headless-mode-1703.png diff --git a/windows/keep-secure/WDAV-working/images/defender/wdav-headless-mode-off-1703.png b/windows/keep-secure/images/defender/wdav-headless-mode-off-1703.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/wdav-headless-mode-off-1703.png rename to windows/keep-secure/images/defender/wdav-headless-mode-off-1703.png diff --git a/windows/keep-secure/WDAV-working/images/defender/wdav-history-wdsc.png b/windows/keep-secure/images/defender/wdav-history-wdsc.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/wdav-history-wdsc.png rename to windows/keep-secure/images/defender/wdav-history-wdsc.png diff --git a/windows/keep-secure/WDAV-working/images/defender/wdav-malware-detected.png b/windows/keep-secure/images/defender/wdav-malware-detected.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/wdav-malware-detected.png rename to windows/keep-secure/images/defender/wdav-malware-detected.png diff --git a/windows/keep-secure/WDAV-working/images/defender/wdav-order-update-sources.png b/windows/keep-secure/images/defender/wdav-order-update-sources.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/wdav-order-update-sources.png rename to windows/keep-secure/images/defender/wdav-order-update-sources.png diff --git a/windows/keep-secure/WDAV-working/images/defender/wdav-path-exclusions.png b/windows/keep-secure/images/defender/wdav-path-exclusions.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/wdav-path-exclusions.png rename to windows/keep-secure/images/defender/wdav-path-exclusions.png diff --git a/windows/keep-secure/WDAV-working/images/defender/wdav-process-exclusions.png b/windows/keep-secure/images/defender/wdav-process-exclusions.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/wdav-process-exclusions.png rename to windows/keep-secure/images/defender/wdav-process-exclusions.png diff --git a/windows/keep-secure/WDAV-working/images/defender/wdav-protection-settings-wdsc.png b/windows/keep-secure/images/defender/wdav-protection-settings-wdsc.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/wdav-protection-settings-wdsc.png rename to windows/keep-secure/images/defender/wdav-protection-settings-wdsc.png diff --git a/windows/keep-secure/WDAV-working/images/defender/wdav-quarantined-history-wdsc.png b/windows/keep-secure/images/defender/wdav-quarantined-history-wdsc.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/wdav-quarantined-history-wdsc.png rename to windows/keep-secure/images/defender/wdav-quarantined-history-wdsc.png diff --git a/windows/keep-secure/WDAV-working/images/defender/wdav-settings-old.png b/windows/keep-secure/images/defender/wdav-settings-old.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/wdav-settings-old.png rename to windows/keep-secure/images/defender/wdav-settings-old.png diff --git a/windows/keep-secure/WDAV-working/images/defender/wdav-wdsc.png b/windows/keep-secure/images/defender/wdav-wdsc.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/wdav-wdsc.png rename to windows/keep-secure/images/defender/wdav-wdsc.png diff --git a/windows/keep-secure/WDAV-working/images/defender/wdav-windows-defender-app-old.png b/windows/keep-secure/images/defender/wdav-windows-defender-app-old.png similarity index 100% rename from windows/keep-secure/WDAV-working/images/defender/wdav-windows-defender-app-old.png rename to windows/keep-secure/images/defender/wdav-windows-defender-app-old.png diff --git a/windows/keep-secure/WDAV-working/manage-event-based-updates-windows-defender-antivirus.md b/windows/keep-secure/manage-event-based-updates-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/manage-event-based-updates-windows-defender-antivirus.md rename to windows/keep-secure/manage-event-based-updates-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/manage-outdated-endpoints-windows-defender-antivirus.md b/windows/keep-secure/manage-outdated-endpoints-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/manage-outdated-endpoints-windows-defender-antivirus.md rename to windows/keep-secure/manage-outdated-endpoints-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/manage-protection-update-schedule-windows-defender-antivirus.md b/windows/keep-secure/manage-protection-update-schedule-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/manage-protection-update-schedule-windows-defender-antivirus.md rename to windows/keep-secure/manage-protection-update-schedule-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/manage-protection-updates-windows-defender-antivirus.md b/windows/keep-secure/manage-protection-updates-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/manage-protection-updates-windows-defender-antivirus.md rename to windows/keep-secure/manage-protection-updates-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/manage-updates-baselines-windows-defender-antivirus.md b/windows/keep-secure/manage-updates-baselines-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/manage-updates-baselines-windows-defender-antivirus.md rename to windows/keep-secure/manage-updates-baselines-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/manage-updates-mobile-devices-vms-windows-defender-antivirus.md b/windows/keep-secure/manage-updates-mobile-devices-vms-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/manage-updates-mobile-devices-vms-windows-defender-antivirus.md rename to windows/keep-secure/manage-updates-mobile-devices-vms-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/prevent-end-user-interaction-windows-defender-antivirus.md b/windows/keep-secure/prevent-end-user-interaction-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/prevent-end-user-interaction-windows-defender-antivirus.md rename to windows/keep-secure/prevent-end-user-interaction-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/report-monitor-windows-defender-antivirus.md b/windows/keep-secure/report-monitor-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/report-monitor-windows-defender-antivirus.md rename to windows/keep-secure/report-monitor-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/review-scan-results-windows-defender-antivirus.md b/windows/keep-secure/review-scan-results-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/review-scan-results-windows-defender-antivirus.md rename to windows/keep-secure/review-scan-results-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/run-cmd-scan-windows-defender-for-windows-10.md b/windows/keep-secure/run-cmd-scan-windows-defender-for-windows-10.md similarity index 100% rename from windows/keep-secure/WDAV-working/run-cmd-scan-windows-defender-for-windows-10.md rename to windows/keep-secure/run-cmd-scan-windows-defender-for-windows-10.md diff --git a/windows/keep-secure/WDAV-working/run-scan-windows-defender-antivirus.md b/windows/keep-secure/run-scan-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/run-scan-windows-defender-antivirus.md rename to windows/keep-secure/run-scan-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/scheduled-catch-up-scans-windows-defender-antivirus.md b/windows/keep-secure/scheduled-catch-up-scans-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/scheduled-catch-up-scans-windows-defender-antivirus.md rename to windows/keep-secure/scheduled-catch-up-scans-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/specify-cloud-protection-level-windows-defender-antivirus.md b/windows/keep-secure/specify-cloud-protection-level-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/specify-cloud-protection-level-windows-defender-antivirus.md rename to windows/keep-secure/specify-cloud-protection-level-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/troubleshoot-windows-defender-antivirus.md b/windows/keep-secure/troubleshoot-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/troubleshoot-windows-defender-antivirus.md rename to windows/keep-secure/troubleshoot-windows-defender-antivirus.md diff --git a/windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md b/windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md index df382bc1fe..7828f0b3e5 100644 --- a/windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md +++ b/windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md @@ -8,3302 +8,9 @@ ms.sitesec: library ms.pagetype: security localizationpriority: medium author: jasesso +redirect_url: /troubleshoot-windows-defender-antivirus/ --- # Troubleshoot Windows Defender in Windows 10 -**Applies to** -- Windows 10 - -IT professionals can review information about event IDs in Windows Defender for Windows 10 and see any relevant action they can take. - -## Windows Defender client event IDs - -This section provides the following information about Windows Defender client events: - -- The text of the message as it appears in the event -- The name of the source of the message -- The symbolic name that identifies each message in the programming source code -- Additional information about the message - -Use the information in this table to help troubleshoot Windows Defender client events; these are located in the **Windows Event Viewer**, under **Windows Logs**. - -**To view a Windows Defender client event** - -1. Open **Event Viewer**. -2. In the console tree, expand **Applications and Services Logs**, then **Microsoft**, then **Windows**, then **Windows Defender**. -3. Double-click on **Operational**. -4. In the details pane, view the list of individual events to find your event. -5. Click the event to see specific details about an event in the lower pane, under the **General** and **Details** tabs. - -You can find a complete list of the Microsoft antimalware event IDs, the symbol, and the description of each ID in [Windows Server Antimalware Events TechNet](https://technet.microsoft.com/library/dn913615.aspx). - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Event ID: 1000 -

Symbolic name:

-
-

MALWAREPROTECTION_SCAN_STARTED

-
-

Message:

-
-

An antimalware scan started. -

-
-

Description:

-
-

-

-
Scan ID: <ID number of the relevant scan.>
-
Scan Type: <Scan type>, for example:
    -
  • Antivirus
  • -
  • Antispyware
  • -
  • Antimalware
  • -
-
-
Scan Parameters: <Scan parameters>, for example:
    -
  • Full scan
  • -
  • Quick scan
  • -
  • Customer scan
  • -
-
-
Scan Resources: <Resources (such as files/directories/BHO) that were scanned.>
-
User: <Domain>\<User>
-
-

-
Event ID: 1001 -

Symbolic name:

-
-

MALWAREPROTECTION_SCAN_COMPLETED

-
-

Message:

-
-

An antimalware scan finished.

-
-

Description:

-
-

-

-
Scan ID: <ID number of the relevant scan.>
-
Scan Type: <Scan type>, for example:
    -
  • Antivirus
  • -
  • Antispyware
  • -
  • Antimalware
  • -
-
-
Scan Parameters: <Scan parameters>, for example:
    -
  • Full scan
  • -
  • Quick scan
  • -
  • Customer scan
  • -
-
-
User: <Domain>\<User>
-
Scan Time: <The duration of a scan.>
-
-

-
Event ID: 1002 -

Symbolic name:

-
-

MALWAREPROTECTION_SCAN_CANCELLED -

-
-

Message:

-
-

An antimalware scan was stopped before it finished. -

-
-

Description:

-
-

-

-
Scan ID: <ID number of the relevant scan.>
-
Scan Type: <Scan type>, for example:
    -
  • Antivirus
  • -
  • Antispyware
  • -
  • Antimalware
  • -
-
-
Scan Parameters: <Scan parameters>, for example:
    -
  • Full scan
  • -
  • Quick scan
  • -
  • Customer scan
  • -
-
-
User: <Domain>\<User>
-
Scan Time: <The duration of a scan.>
-
-

-
Event ID: 1003 -

Symbolic name:

-
-

MALWAREPROTECTION_SCAN_PAUSED -

-
-

Message:

-
-

An antimalware scan was paused. -

-
-

Description:

-
-

-

-
Scan ID: <ID number of the relevant scan.>
-
Scan Type: <Scan type>, for example:
    -
  • Antivirus
  • -
  • Antispyware
  • -
  • Antimalware
  • -
-
-
Scan Parameters: <Scan parameters>, for example:
    -
  • Full scan
  • -
  • Quick scan
  • -
  • Customer scan
  • -
-
-
User: <Domain>\<User>
-
-

-
Event ID: 1004 -

Symbolic name:

-
-

MALWAREPROTECTION_SCAN_RESUMED -

-
-

Message:

-
-

An antimalware scan was resumed. -

-
-

Description:

-
-

-

-
Scan ID: <ID number of the relevant scan.>
-
Scan Type: <Scan type>, for example:
    -
  • Antivirus
  • -
  • Antispyware
  • -
  • Antimalware
  • -
-
-
Scan Parameters: <Scan parameters>, for example:
    -
  • Full scan
  • -
  • Quick scan
  • -
  • Customer scan
  • -
-
-
User: <Domain>\<User>
-
-

-
Event ID: 1005 -

Symbolic name:

-
-

MALWAREPROTECTION_SCAN_FAILED -

-
-

Message:

-
-

An antimalware scan failed. -

-
-

Description:

-
-

-

-
Scan ID: <ID number of the relevant scan.>
-
Scan Type: <Scan type>, for example:
    -
  • Antivirus
  • -
  • Antispyware
  • -
  • Antimalware
  • -
-
-
Scan Parameters: <Scan parameters>, for example:
    -
  • Full scan
  • -
  • Quick scan
  • -
  • Customer scan
  • -
-
-
User: <Domain>\<User>
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
-

-
-

User action:

-
-

The Windows Defender client encountered an error, and the current scan has stopped. The scan might fail due to a client-side issue. This event record includes the scan ID, type of scan (antivirus, antispyware, antimalware), scan parameters, the user that started the scan, the error code, and a description of the error. -

-

To troubleshoot this event: -

    -
  1. Run the scan again.
  2. -
  3. If it fails in the same way, go to the Microsoft Support site, enter the error number in the Search box to look for the error code.
  4. -
  5. Contact Microsoft Technical Support. -
  6. -
-

-
Event ID: 1006 -

Symbolic name:

-
-

MALWAREPROTECTION_MALWARE_DETECTED -

-
-

Message:

-
-

The antimalware engine found malware or other potentially unwanted software. -

-
-

Description:

-
-

-

For more information please see the following:

-
-
Name: <Threat name>
-
ID: <Threat ID>
-
Severity: <Severity>, for example:
    -
  • Low
  • -
  • Moderate
  • -
  • High
  • -
  • Severe
  • -
-
-
Category: <Category description>, for example, any threat or malware type.
-
Path: <File path>
-
Detection Origin: <Detection origin>, for example:
    -
  • Unknown
  • -
  • Local computer
  • -
  • Network share
  • -
  • Internet
  • -
  • Incoming traffic
  • -
  • Outgoing traffic
  • -
-
-
Detection Type: <Detection type>, for example:
    -
  • Heuristics
  • -
  • Generic
  • -
  • Concrete
  • -
  • Dynamic signature
  • -
-
-
Detection Source: <Detection source> for example:
    -
  • User: user initiated
  • -
  • System: system initiated
  • -
  • Real-time: real-time component initiated
  • -
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • -
  • NIS: Network inspection system
  • -
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • -
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • -
  • Remote attestation
  • -
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. -UAC
-
Status: <Status>
-
User: <Domain>\<User>
-
Process Name: <Process in the PID>
-
Signature Version: <Definition version>
-
Engine Version: <Antimalware Engine version>
-
-

-
Event ID: 1007 -

Symbolic name:

-
-

MALWAREPROTECTION_MALWARE_ACTION_TAKEN -

-
-

Message:

-
-

The antimalware platform performed an action to protect your system from malware or other potentially unwanted software. -

-
-

Description:

-
-

-

Windows Defender has taken action to protect this machine from malware or other potentially unwanted software. For more information please see the following:

-
-
User: <Domain>\<User>
-
Name: <Threat name>
-
ID: <Threat ID>
-
Severity: <Severity>, for example:
    -
  • Low
  • -
  • Moderate
  • -
  • High
  • -
  • Severe
  • -
-
-
Category: <Category description>, for example, any threat or malware type.
-
Action: <Action>, for example:
    -
  • Clean: The resource was cleaned
  • -
  • Quarantine: The resource was quarantined
  • -
  • Remove: The resource was deleted
  • -
  • Allow: The resource was allowed to execute/exist
  • -
  • User defined: User defined action which is normally one from this list of actions that the user has specified
  • -
  • No action: No action
  • -
  • Block: The resource was blocked from executing
  • -
-
-
Status: <Status>
-
Signature Version: <Definition version>
-
Engine Version: <Antimalware Engine version>
-
-

-
Event ID: 1008 -

Symbolic name:

-
-

MALWAREPROTECTION_MALWARE_ACTION_FAILED

-
-

Message:

-
-

The antimalware platform attempted to perform an action to protect your system from malware or other potentially unwanted software, but the action failed.

-
-

Description:

-
-

-

Windows Defender has encountered an error when taking action on malware or other potentially unwanted software. For more information please see the following:

-
-
User: <Domain>\<User>
-
Name: <Threat name>
-
ID: <Threat ID>
-
Severity: <Severity>, for example:
    -
  • Low
  • -
  • Moderate
  • -
  • High
  • -
  • Severe
  • -
-
-
Category: <Category description>, for example, any threat or malware type.
-
Path: <File path>
-
Action: <Action>, for example:
    -
  • Clean: The resource was cleaned
  • -
  • Quarantine: The resource was quarantined
  • -
  • Remove: The resource was deleted
  • -
  • Allow: The resource was allowed to execute/exist
  • -
  • User defined: User defined action which is normally one from this list of actions that the user has specified
  • -
  • No action: No action
  • -
  • Block: The resource was blocked from executing
  • -
-
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
Status: <Status>
-
Signature Version: <Definition version>
-
Engine Version: <Antimalware Engine version>
-
-

-
Event ID: 1009 -

Symbolic name:

-
-

MALWAREPROTECTION_QUARANTINE_RESTORE -

-
-

Message:

-
-

The antimalware platform restored an item from quarantine. -

-
-

Description:

-
-

-

Windows Defender has restored an item from quarantine. For more information please see the following:

-
-
Name: <Threat name>
-
ID: <Threat ID>
-
Severity: <Severity>, for example:
    -
  • Low
  • -
  • Moderate
  • -
  • High
  • -
  • Severe
  • -
-
-
Category: <Category description>, for example, any threat or malware type.
-
Path: <File path>
-
User: <Domain>\<User>
-
Signature Version: <Definition version>
-
Engine Version: <Antimalware Engine version>
-
-

-
Event ID: 1010 -

Symbolic name:

-
-

MALWAREPROTECTION_QUARANTINE_RESTORE_FAILED -

-
-

Message:

-
-

The antimalware platform could not restore an item from quarantine. -

-
-

Description:

-
-

-

Windows Defender has encountered an error trying to restore an item from quarantine. For more information please see the following:

-
-
Name: <Threat name>
-
ID: <Threat ID>
-
Severity: <Severity>, for example:
    -
  • Low
  • -
  • Moderate
  • -
  • High
  • -
  • Severe
  • -
-
-
Category: <Category description>, for example, any threat or malware type.
-
Path: <File path>
-
User: <Domain>\<User>
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
Signature Version: <Definition version>
-
Engine Version: <Antimalware Engine version>
-
-

-
Event ID: 1011 -

Symbolic name:

-
-

MALWAREPROTECTION_QUARANTINE_DELETE

-
-

Message:

-
-

The antimalware platform deleted an item from quarantine. -

-
-

Description:

-
-

-

Windows Defender has deleted an item from quarantine. -For more information please see the following:

-
-
Name: <Threat name>
-
ID: <Threat ID>
-
Severity: <Severity>, for example:
    -
  • Low
  • -
  • Moderate
  • -
  • High
  • -
  • Severe
  • -
-
-
Category: <Category description>, for example, any threat or malware type.
-
Path: <File path>
-
User: <Domain>\<User>
-
Signature Version: <Definition version>
-
Engine Version: <Antimalware Engine version>
-
-

-
Event ID: 1012 -

Symbolic name:

-
-

MALWAREPROTECTION_QUARANTINE_DELETE_FAILED -

-
-

Message:

-
-

The antimalware platform could not delete an item from quarantine.

-
-

Description:

-
-

-

Windows Defender has encountered an error trying to delete an item from quarantine. -For more information please see the following:

-
-
Name: <Threat name>
-
ID: <Threat ID>
-
Severity: <Severity>, for example:
    -
  • Low
  • -
  • Moderate
  • -
  • High
  • -
  • Severe
  • -
-
-
Category: <Category description>, for example, any threat or malware type.
-
Path: <File path>
-
User: <Domain>\<User>
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
Signature Version: <Definition version>
-
Engine Version: <Antimalware Engine version>
-
-

-
Event ID: 1013 -

Symbolic name:

-
-

MALWAREPROTECTION_MALWARE_HISTORY_DELETE -

-
-

Message:

-
-

The antimalware platform deleted history of malware and other potentially unwanted software.

-
-

Description:

-
-

-

Windows Defender has removed history of malware and other potentially unwanted software.

-
-
Time: The time when the event occurred, for example when the history is purged. Note that this parameter is not used in threat events so that there is no confusion regarding whether it is remediation time or infection time. For those, we specifically call them as Action Time or Detection Time.
-
User: <Domain>\<User>
-
-

-
Event ID: 1014 -

Symbolic name:

-
-

MALWAREPROTECTION_MALWARE_HISTORY_DELETE_FAILED -

-
-

Message:

-
-

The antimalware platform could not delete history of malware and other potentially unwanted software.

-
-

Description:

-
-

-

Windows Defender has encountered an error trying to remove history of malware and other potentially unwanted software.

-
-
Time: The time when the event occurred, for example when the history is purged. Note that this parameter is not used in threat events so that there is no confusion regarding whether it is remediation time or infection time. For those, we specifically call them as Action Time or Detection Time.
-
User: <Domain>\<User>
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
-

-
Event ID: 1015 -

Symbolic name:

-
-

MALWAREPROTECTION_BEHAVIOR_DETECTED -

-
-

Message:

-
-

The antimalware platform detected suspicious behavior.

-
-

Description:

-
-

-

Windows Defender has detected a suspicious behavior. -For more information please see the following:

-
-
Name: <Threat name>
-
ID: <Threat ID>
-
Severity: <Severity>, for example:
    -
  • Low
  • -
  • Moderate
  • -
  • High
  • -
  • Severe
  • -
-
-
Category: <Category description>, for example, any threat or malware type.
-
Path: <File path>
-
Detection Origin: <Detection origin>, for example: -
    -
  • Unknown
  • -
  • Local computer
  • -
  • Network share
  • -
  • Internet
  • -
  • Incoming traffic
  • -
  • Outgoing traffic
  • -
-
-
Detection Type: <Detection type>, for example:
    -
  • Heuristics
  • -
  • Generic
  • -
  • Concrete
  • -
  • Dynamic signature
  • -
-
-
Detection Source: <Detection source> for example:
    -
  • User: user initiated
  • -
  • System: system initiated
  • -
  • Real-time: real-time component initiated
  • -
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • -
  • NIS: Network inspection system
  • -
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • -
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • -
  • Remote attestation
  • -
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. -UAC
-
Status: <Status>
-
User: <Domain>\<User>
-
Process Name: <Process in the PID>
-
Signature ID: Enumeration matching severity.
-
Signature Version: <Definition version>
-
Engine Version: <Antimalware Engine version>
-
Fidelity Label:
-
Target File Name: <File name> -Name of the file.
-
-

-
Event ID: 1116 -

Symbolic name:

-
-

MALWAREPROTECTION_STATE_MALWARE_DETECTED

-
-

Message:

-
-

The antimalware platform detected malware or other potentially unwanted software. -

-
-

Description:

-
-

-

Windows Defender has detected malware or other potentially unwanted software. -For more information please see the following:

-
-
Name: <Threat name>
-
ID: <Threat ID>
-
Severity: <Severity>, for example:
    -
  • Low
  • -
  • Moderate
  • -
  • High
  • -
  • Severe
  • -
-
-
Category: <Category description>, for example, any threat or malware type.
-
Path: <File path>
-
Detection Origin: <Detection origin>, for example: -
    -
  • Unknown
  • -
  • Local computer
  • -
  • Network share
  • -
  • Internet
  • -
  • Incoming traffic
  • -
  • Outgoing traffic
  • -
-
-
Detection Type: <Detection type>, for example:
    -
  • Heuristics
  • -
  • Generic
  • -
  • Concrete
  • -
  • Dynamic signature
  • -
-
-
Detection Source: <Detection source> for example:
    -
  • User: user initiated
  • -
  • System: system initiated
  • -
  • Real-time: real-time component initiated
  • -
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • -
  • NIS: Network inspection system
  • -
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • -
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • -
  • Remote attestation
  • -
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. -UAC
-
User: <Domain>\<User>
-
Process Name: <Process in the PID>
-
Signature Version: <Definition version>
-
Engine Version: <Antimalware Engine version>
-
-

-
-

User action:

-
-

No action is required. Windows Defender can suspend and take routine action on this threat. If you want to remove the threat manually, in the Windows Defender interface, click Clean Computer.

-
Event ID: 1117 -

Symbolic name:

-
-

MALWAREPROTECTION_STATE_MALWARE_ACTION_TAKEN -

-
-

Message:

-
-

The antimalware platform performed an action to protect your system from malware or other potentially unwanted software. -

-
-

Description:

-
-

-

Windows Defender has taken action to protect this machine from malware or other potentially unwanted software. -For more information please see the following:

-
-
Name: <Threat name>
-
ID: <Threat ID>
-
Severity: <Severity>, for example:
    -
  • Low
  • -
  • Moderate
  • -
  • High
  • -
  • Severe
  • -
-
-
Category: <Category description>, for example, any threat or malware type.
-
Path: <File path>
-
Detection Origin: <Detection origin>, for example: -
    -
  • Unknown
  • -
  • Local computer
  • -
  • Network share
  • -
  • Internet
  • -
  • Incoming traffic
  • -
  • Outgoing traffic
  • -
-
-
Detection Type: <Detection type>, for example:
    -
  • Heuristics
  • -
  • Generic
  • -
  • Concrete
  • -
  • Dynamic signature
  • -
-
-
Detection Source: <Detection source> for example:
    -
  • User: user initiated
  • -
  • System: system initiated
  • -
  • Real-time: real-time component initiated
  • -
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • -
  • NIS: Network inspection system
  • -
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • -
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • -
  • Remote attestation
  • -
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. -UAC
-
User: <Domain>\<User>
-
Process Name: <Process in the PID>
-
Action: <Action>, for example:
    -
  • Clean: The resource was cleaned
  • -
  • Quarantine: The resource was quarantined
  • -
  • Remove: The resource was deleted
  • -
  • Allow: The resource was allowed to execute/exist
  • -
  • User defined: User defined action which is normally one from this list of actions that the user has specified
  • -
  • No action: No action
  • -
  • Block: The resource was blocked from executing
  • -
-
-
Action Status: <Description of additional actions>
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
Signature Version: <Definition version>
-
Engine Version: <Antimalware Engine version>
-

NOTE: -

Whenever Windows Defender, Microsoft Security Essentials, Malicious Software Removal Tool, or System Center Endpoint Protection detects a malware, it will restore the following system settings and services which the malware might have changed:

    -
  • Default Internet Explorer or Edge setting
  • -
  • User Access Control settings
  • -
  • Chrome settings
  • -
  • Boot Control Data
  • -
  • Regedit and Task Manager registry settings
  • -
  • Windows Update, Background Intelligent Transfer Service, and Remote Procedure Call service
  • -
  • Windows Operating System files
-The above context applies to the following client and server versions: - - - - - - - - - - - - - -
Operating systemOperating system version
-

Client Operating System

-
-

Windows Vista (Service Pack 1, or Service Pack 2), Windows 7 and later

-
-

Server Operating System

-
-

Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2016

-
-

-
-
-

User action:

-
-

No action is necessary. Windows Defender removed or quarantined a threat.

-
Event ID: 1118 -

Symbolic name:

-
-

MALWAREPROTECTION_STATE_MALWARE_ACTION_FAILED

-
-

Message:

-
-

The antimalware platform attempted to perform an action to protect your system from malware or other potentially unwanted software, but the action failed. -

-
-

Description:

-
-

-

Windows Defender has encountered a non-critical error when taking action on malware or other potentially unwanted software. -For more information please see the following:

-
-
Name: <Threat name>
-
ID: <Threat ID>
-
Severity: <Severity>, for example:
    -
  • Low
  • -
  • Moderate
  • -
  • High
  • -
  • Severe
  • -
-
-
Category: <Category description>, for example, any threat or malware type.
-
Path: <File path>
-
Detection Origin: <Detection origin>, for example: -
    -
  • Unknown
  • -
  • Local computer
  • -
  • Network share
  • -
  • Internet
  • -
  • Incoming traffic
  • -
  • Outgoing traffic
  • -
-
-
Detection Type: <Detection type>, for example:
    -
  • Heuristics
  • -
  • Generic
  • -
  • Concrete
  • -
  • Dynamic signature
  • -
-
-
Detection Source: <Detection source> for example:
    -
  • User: user initiated
  • -
  • System: system initiated
  • -
  • Real-time: real-time component initiated
  • -
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • -
  • NIS: Network inspection system
  • -
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • -
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • -
  • Remote attestation
  • -
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. -UAC
-
User: <Domain>\<User>
-
Process Name: <Process in the PID>
-
Action: <Action>, for example:
    -
  • Clean: The resource was cleaned
  • -
  • Quarantine: The resource was quarantined
  • -
  • Remove: The resource was deleted
  • -
  • Allow: The resource was allowed to execute/exist
  • -
  • User defined: User defined action which is normally one from this list of actions that the user has specified
  • -
  • No action: No action
  • -
  • Block: The resource was blocked from executing
  • -
-
-
Action Status: <Description of additional actions>
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
Signature Version: <Definition version>
-
Engine Version: <Antimalware Engine version>
-
-

-
-

User action:

-
-

No action is necessary. Windows Defender failed to complete a task related to the malware remediation. This is not a critical failure.

-
Event ID: 1119 -

Symbolic name:

-
-

MALWAREPROTECTION_STATE_MALWARE_ACTION_CRITICALLY_FAILED -

-
-

Message:

-
-

The antimalware platform encountered a critical error when trying to take action on malware or other potentially unwanted software. There are more details in the event message.

-
-

Description:

-
-

-

Windows Defender has encountered a critical error when taking action on malware or other potentially unwanted software. -For more information please see the following:

-
-
Name: <Threat name>
-
ID: <Threat ID>
-
Severity: <Severity>, for example:
    -
  • Low
  • -
  • Moderate
  • -
  • High
  • -
  • Severe
  • -
-
-
Category: <Category description>, for example, any threat or malware type.
-
Path: <File path>
-
Detection Origin: <Detection origin>, for example: -
    -
  • Unknown
  • -
  • Local computer
  • -
  • Network share
  • -
  • Internet
  • -
  • Incoming traffic
  • -
  • Outgoing traffic
  • -
-
-
Detection Type: <Detection type>, for example:
    -
  • Heuristics
  • -
  • Generic
  • -
  • Concrete
  • -
  • Dynamic signature
  • -
-
-
Detection Source: <Detection source> for example:
    -
  • User: user initiated
  • -
  • System: system initiated
  • -
  • Real-time: real-time component initiated
  • -
  • IOAV: IE Downloads and Outlook Express Attachments initiated
  • -
  • NIS: Network inspection system
  • -
  • IEPROTECT: IE - IExtensionValidation; this protects against malicious webpage controls
  • -
  • Early Launch Antimalware (ELAM). This includes malware detected by the boot sequence
  • -
  • Remote attestation
  • -
Antimalware Scan Interface (AMSI). Primarily used to protect scripts (PS, VBS), though it can be invoked by third parties as well. -UAC
-
User: <Domain>\<User>
-
Process Name: <Process in the PID>
-
Action: <Action>, for example:
    -
  • Clean: The resource was cleaned
  • -
  • Quarantine: The resource was quarantined
  • -
  • Remove: The resource was deleted
  • -
  • Allow: The resource was allowed to execute/exist
  • -
  • User defined: User defined action which is normally one from this list of actions that the user has specified
  • -
  • No action: No action
  • -
  • Block: The resource was blocked from executing
  • -
-
-
Action Status: <Description of additional actions>
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
Signature Version: <Definition version>
-
Engine Version: <Antimalware Engine version>
-
-

-
-

User action:

-
-

The Windows Defender client encountered this error due to critical issues. The endpoint might not be protected. Review the error description then follow the relevant User action steps below.

- - - - - - - - - - - - - - - - - - - - - -
ActionUser action
-

Remove

-
-

Update the definitions then verify that the removal was successful.

-
-

Clean

-
-

Update the definitions then verify that the remediation was successful.

-
-

Quarantine

-
-

Update the definitions and verify that the user has permission to access the necessary resources.

-
-

Allow

-
-

Verify that the user has permission to access the necessary resources.

-
-

 

-

If this event persists:

    -
  1. Run the scan again.
  2. -
  3. If it fails in the same way, go to the Microsoft Support site, enter the error number in the Search box to look for the error code.
  4. -
  5. Contact Microsoft Technical Support. -
  6. -
-

-
Event ID: 1120 -

Symbolic name:

-
-

MALWAREPROTECTION_THREAT_HASH

-
-

Message:

-
-

Windows Defender has deduced the hashes for a threat resource.

-
-

Description:

-
-

-

Windows Defender client is up and running in a healthy state.

-
-
Current Platform Version: <Current platform version>
-
Threat Resource Path: <Path>
-
Hashes: <Hashes>
-
-

-
-
Note  This event will only be logged if the following policy is set: ThreatFileHashLogging unsigned.
-
 
-
Event ID: 1150 -

Symbolic name:

-
-

MALWAREPROTECTION_SERVICE_HEALTHY

-
-

Message:

-
-

If your antimalware platform reports status to a monitoring platform, this event indicates that the antimalware platform is running and in a healthy state. -

-
-

Description:

-
-

-

Windows Defender client is up and running in a healthy state.

-
-
Platform Version: <Current platform version>
-
Signature Version: <Definition version>
-
Engine Version: <Antimalware Engine version>
-
-

-
-

User action:

-
-

No action is necessary. The Windows Defenderclient is in a healthy state. This event is reported on an hourly basis.

-
Event ID: 2000 -

Symbolic name:

-
-

MALWAREPROTECTION_SIGNATURE_UPDATED -

-
-

Message:

-
-

The antimalware definitions updated successfully. -

-
-

Description:

-
-

-

Windows Defender signature version has been updated.

-
-
Current Signature Version: <Current signature version>
-
Previous Signature Version: <Previous signature version>
-
Signature Type: <Signature type>, for example:
    -
  • Antivirus
  • -
  • Antispyware
  • -
  • Antimalware
  • -
  • Network Inspection System
  • -
-
-
Update Type: <Update type>, either Full or Delta.
-
User: <Domain>\<User>
-
Current Engine Version: <Current engine version>
-
Previous Engine Version: <Previous engine version>
-
-

-
-

User action:

-
-

No action is necessary. The Windows Defender client is in a healthy state. This event is reported when signatures are successfully updated.

-
Event ID: 2001 -

Symbolic name:

-
-

MALWAREPROTECTION_SIGNATURE_UPDATE_FAILED

-
-

Message:

-
-

The antimalware definition update failed. -

-
-

Description:

-
-

-

Windows Defender has encountered an error trying to update signatures.

-
-
New Signature Version: <New version number>
-
Previous Signature Version: <Previous signature version>
-
Update Source: <Update source>, for example: -
    -
  • Signature update folder
  • -
  • Internal definition update server
  • -
  • Microsoft Update Server
  • -
  • File share
  • -
  • Microsoft Malware Protection Center (MMPC)
  • -
-
-
Update Stage: <Update stage>, for example: -
    -
  • Search
  • -
  • Download
  • -
  • Install
  • -
-
-
Source Path: File share name for Universal Naming Convention (UNC), server name for Windows Server Update Services (WSUS)/Microsoft Update/ADL.
-
Signature Type: <Signature type>, for example:
    -
  • Antivirus
  • -
  • Antispyware
  • -
  • Antimalware
  • -
  • Network Inspection System
  • -
-
-
Update Type: <Update type>, either Full or Delta.
-
User: <Domain>\<User>
-
Current Engine Version: <Current engine version>
-
Previous Engine Version: <Previous engine version>
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
-

-
-

User action:

-
-

This error occurs when there is a problem updating definitions.

-

To troubleshoot this event: -

    -
  1. Update the definitions. Either:
      -
    1. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows Defender

      Or,

      -
    2. -
    3. Download the latest definitions from the Microsoft Malware Protection Center. -

      Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

      -
    4. -
    -
  2. -
  3. Review the entries in the %Windir%\WindowsUpdate.log file for more information about this error.
  4. -
  5. Contact Microsoft Technical Support. -
  6. -
-

-
Event ID: 2002 -

Symbolic name:

-
-

MALWAREPROTECTION_ENGINE_UPDATED

-
-

Message:

-
-

The antimalware engine updated successfully. -

-
-

Description:

-
-

-

Windows Defender engine version has been updated.

-
-
Current Engine Version: <Current engine version>
-
Previous Engine Version: <Previous engine version>
-
Engine Type: <Engine type>, either antimalware engine or Network Inspection System engine.
-
User: <Domain>\<User>
-
-

-
-

User action:

-
-

No action is necessary. The Windows Defender client is in a healthy state. This event is reported when the antimalware engine is successfully updated.

-
Event ID: 2003 -

Symbolic name:

-
-

MALWAREPROTECTION_ENGINE_UPDATE_FAILED

-
-

Message:

-
-

The antimalware engine update failed. -

-
-

Description:

-
-

-

Windows Defender has encountered an error trying to update the engine.

-
-
New Engine Version:
-
Previous Engine Version: <Previous engine version>
-
Engine Type: <Engine type>, either antimalware engine or Network Inspection System engine.
-
User: <Domain>\<User>
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
-

-
-

User action:

-
-

The Windows Defender client update failed. This event occurs when the client fails to update itself. This event is usually due to an interruption in network connectivity during an update.

-

To troubleshoot this event: -

    -
  1. Update the definitions. Either:
      -
    1. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows Defender

      Or,

      -
    2. -
    3. Download the latest definitions from the Microsoft Malware Protection Center. -

      Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

      -
    4. -
    -
  2. -
  3. Contact Microsoft Technical Support. -
  4. -
-

-
Event ID: 2004 -

Symbolic name:

-
-

MALWAREPROTECTION_SIGNATURE_REVERSION

-
-

Message:

-
-

There was a problem loading antimalware definitions. The antimalware engine will attempt to load the last-known good set of definitions.

-
-

Description:

-
-

-

Windows Defender has encountered an error trying to load signatures and will attempt reverting back to a known-good set of signatures.

-
-
Signatures Attempted:
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
Signature Version: <Definition version>
-
Engine Version: <Antimalware engine version>
-
-

-
-

User action:

-
-

The Windows Defender client attempted to download and install the latest definitions file and failed. This error can occur when the client encounters an error while trying to load the definitions, or if the file is corrupt. Windows Defender will attempt to revert back to a known-good set of definitions.

-

To troubleshoot this event: -

    -
  1. Restart the computer and try again.
  2. -
  3. Download the latest definitions from the Microsoft Malware Protection Center. -

    Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

    -
  4. -
  5. Contact Microsoft Technical Support. -
  6. -
-

-
Event ID: 2005 -

Symbolic name:

-
-

MALWAREPROTECTION_ENGINE_UPDATE_PLATFORMOUTOFDATE

-
-

Message:

-
-

The antimalware engine failed to load because the antimalware platform is out of date. The antimalware platform will load the last-known good antimalware engine and attempt to update.

-
-

Description:

-
-

-

Windows Defender could not load antimalware engine because current platform version is not supported. Windows Defender will revert back to the last known-good engine and a platform update will be attempted.

-
-
Current Platform Version: <Current platform version>
-
-

-
Event ID: 2006 -

Symbolic name:

-
-

MALWAREPROTECTION_PLATFORM_UPDATE_FAILED -

-
-

Message:

-
-

The platform update failed. -

-
-

Description:

-
-

-

Windows Defender has encountered an error trying to update the platform.

-
-
Current Platform Version: <Current platform version>
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
-

-
Event ID: 2007 -

Symbolic name:

-
-

MALWAREPROTECTION_PLATFORM_ALMOSTOUTOFDATE

-
-

Message:

-
-

The platform will soon be out of date. Download the latest platform to maintain up-to-date protection.

-
-

Description:

-
-

-

Windows Defender will soon require a newer platform version to support future versions of the antimalware engine. Download the latest Windows Defender platform to maintain the best level of protection available.

-
-
Current Platform Version: <Current platform version>
-
-

-
Event ID: 2010 -

Symbolic name:

-
-

MALWAREPROTECTION_SIGNATURE_FASTPATH_UPDATED -

-
-

Message:

-
-

The antimalware engine used the Dynamic Signature Service to get additional definitions. -

-
-

Description:

-
-

-

Windows Defender used Dynamic Signature Service to retrieve additional signatures to help protect your machine.

-
-
Current Signature Version: <Current signature version>
-
Signature Type: <Signature type>, for example:
    -
  • Antivirus
  • -
  • Antispyware
  • -
  • Antimalware
  • -
  • Network Inspection System
  • -
-
-
Current Engine Version: <Current engine version>
-
Dynamic Signature Type: <Dynamic signature type>, for example: -
    -
  • Version
  • -
  • Timestamp
  • -
  • No limit
  • -
  • Duration
  • -
-
-
Persistence Path: <Path>
-
Dynamic Signature Version: <Version number>
-
Dynamic Signature Compilation Timestamp: <Timestamp>
-
Persistence Limit Type: <Persistence limit type>, for example: -
    -
  • VDM version
  • -
  • Timestamp
  • -
  • No limit
  • -
-
-
Persistence Limit: Persistence limit of the fastpath signature.
-
-

-
Event ID: 2011 -

Symbolic name:

-
-

MALWAREPROTECTION_SIGNATURE_FASTPATH_DELETED -

-
-

Message:

-
-

The Dynamic Signature Service deleted the out-of-date dynamic definitions. -

-
-

Description:

-
-

-

Windows Defender used Dynamic Signature Service to discard obsolete signatures.

-
-
Current Signature Version: <Current signature version>
-
Signature Type: <Signature type>, for example:
    -
  • Antivirus
  • -
  • Antispyware
  • -
  • Antimalware
  • -
  • Network Inspection System
  • -
-
-
Current Engine Version: <Current engine version>
-
Dynamic Signature Type: <Dynamic signature type>, for example: -
    -
  • Version
  • -
  • Timestamp
  • -
  • No limit
  • -
  • Duration
  • -
-
-
Persistence Path: <Path>
-
Dynamic Signature Version: <Version number>
-
Dynamic Signature Compilation Timestamp: <Timestamp>
-
Removal Reason:
-
Persistence Limit Type: <Persistence limit type>, for example: -
    -
  • VDM version
  • -
  • Timestamp
  • -
  • No limit
  • -
-
-
Persistence Limit: Persistence limit of the fastpath signature.
-
-

-
-

User action:

-
-

No action is necessary. The Windows Defender client is in a healthy state. This event is reported when the Dynamic Signature Service successfully deletes out-of-date dynamic definitions.

-
Event ID: 2012 -

Symbolic name:

-
-

MALWAREPROTECTION_SIGNATURE_FASTPATH_UPDATE_FAILED -

-
-

Message:

-
-

The antimalware engine encountered an error when trying to use the Dynamic Signature Service. -

-
-

Description:

-
-

-

Windows Defender has encountered an error trying to use Dynamic Signature Service.

-
-
Current Signature Version: <Current signature version>
-
Signature Type: <Signature type>, for example:
    -
  • Antivirus
  • -
  • Antispyware
  • -
  • Antimalware
  • -
  • Network Inspection System
  • -
-
-
Current Engine Version: <Current engine version>
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
Dynamic Signature Type: <Dynamic signature type>, for example: -
    -
  • Version
  • -
  • Timestamp
  • -
  • No limit
  • -
  • Duration
  • -
-
-
Persistence Path: <Path>
-
Dynamic Signature Version: <Version number>
-
Dynamic Signature Compilation Timestamp: <Timestamp>
-
Persistence Limit Type: <Persistence limit type>, for example: -
    -
  • VDM version
  • -
  • Timestamp
  • -
  • No limit
  • -
-
-
Persistence Limit: Persistence limit of the fastpath signature.
-
-

-
-

User action:

-
-

Check your Internet connectivity settings.

-
Event ID: 2013 -

Symbolic name:

-
-

MALWAREPROTECTION_SIGNATURE_FASTPATH_DELETED_ALL -

-
-

Message:

-
-

The Dynamic Signature Service deleted all dynamic definitions. -

-
-

Description:

-
-

-

Windows Defender discarded all Dynamic Signature Service signatures.

-
-
Current Signature Version: <Current signature version>
-
-

-
Event ID: 2020 -

Symbolic name:

-
-

MALWAREPROTECTION_CLOUD_CLEAN_RESTORE_FILE_DOWNLOADED -

-
-

Message:

-
-

The antimalware engine downloaded a clean file. -

-
-

Description:

-
-

-

Windows Defender downloaded a clean file.

-
-
Filename: <File name> -Name of the file.
-
Current Signature Version: <Current signature version>
-
Current Engine Version: <Current engine version>
-
-

-
Event ID: 2021 -

Symbolic name:

-
-

MALWAREPROTECTION_CLOUD_CLEAN_RESTORE_FILE_DOWNLOAD_FAILED

-
-

Message:

-
-

The antimalware engine failed to download a clean file. -

-
-

Description:

-
-

-

Windows Defender has encountered an error trying to download a clean file.

-
-
Filename: <File name> -Name of the file.
-
Current Signature Version: <Current signature version>
-
Current Engine Version: <Current engine version>
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
-

-
-

User action:

-
-

Check your Internet connectivity settings. -

-

The Windows Defender client encountered an error when using the Dynamic Signature Service to download the latest definitions to a specific threat. This error is likely caused by a network connectivity issue. -

-
Event ID: 2030 -

Symbolic name:

-
-

MALWAREPROTECTION_OFFLINE_SCAN_INSTALLED

-
-

Message:

-
-

The antimalware engine was downloaded and is configured to run offline on the next system restart.

-
-

Description:

-
-

Windows Defender downloaded and configured Windows Defender Offline to run on the next reboot.

-
Event ID: 2031 -

Symbolic name:

-
-

MALWAREPROTECTION_OFFLINE_SCAN_INSTALL_FAILED -

-
-

Message:

-
-

The antimalware engine was unable to download and configure an offline scan.

-
-

Description:

-
-

-

Windows Defender has encountered an error trying to download and configure Windows Defender Offline.

-
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
-

-
Event ID: 2040 -

Symbolic name:

-
-

MALWAREPROTECTION_OS_EXPIRING -

-
-

Message:

-
-

Antimalware support for this operating system version will soon end. -

-
-

Description:

-
-

The support for your operating system will expire shortly. Running Windows Defender on an out of support operating system is not an adequate solution to protect against threats.

-
Event ID: 2041 -

Symbolic name:

-
-

MALWAREPROTECTION_OS_EOL -

-
-

Message:

-
-

Antimalware support for this operating system has ended. You must upgrade the operating system for continued support. -

-
-

Description:

-
-

The support for your operating system has expired. Running Windows Defender on an out of support operating system is not an adequate solution to protect against threats.

-
Event ID: 2042 -

Symbolic name:

-
-

MALWAREPROTECTION_PROTECTION_EOL -

-
-

Message:

-
-

The antimalware engine no longer supports this operating system, and is no longer protecting your system from malware. -

-
-

Description:

-
-

The support for your operating system has expired. Windows Defender is no longer supported on your operating system, has stopped functioning, and is not protecting against malware threats.

-
Event ID: 3002 -

Symbolic name:

-
-

MALWAREPROTECTION_RTP_FEATURE_FAILURE -

-
-

Message:

-
-

Real-time protection encountered an error and failed.

-
-

Description:

-
-

-

Windows Defender Real-Time Protection feature has encountered an error and failed.

-
-
Feature: <Feature>, for example: -
    -
  • On Access
  • -
  • Internet Explorer downloads and Microsoft Outlook Express attachments
  • -
  • Behavior monitoring
  • -
  • Network Inspection System
  • -
-
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
Reason: The reason Windows Defender real-time protection has restarted a feature.
-
-

-
-

User action:

-
-

You should restart the system then run a full scan because it’s possible the system was not protected for some time. -

-

The Windows Defender client’s real-time protection feature encountered an error because one of the services failed to start. -

-

If it is followed by a 3007 event ID, the failure was temporary and the antimalware client recovered from the failure. -

-
Event ID: 3007 -

Symbolic name:

-
-

MALWAREPROTECTION_RTP_FEATURE_RECOVERED

-
-

Message:

-
-

Real-time protection recovered from a failure. We recommend running a full system scan when you see this error. -

-
-

Description:

-
-

-

Windows Defender Real-time Protection has restarted a feature. It is recommended that you run a full system scan to detect any items that may have been missed while this agent was down.

-
-
Feature: <Feature>, for example: -
    -
  • On Access
  • -
  • IE downloads and Outlook Express attachments
  • -
  • Behavior monitoring
  • -
  • Network Inspection System
  • -
-
-
Reason: The reason Windows Defender real-time protection has restarted a feature.
-
-

-
-

User action:

-
-

The real-time protection feature has restarted. If this event happens again, contact Microsoft Technical Support.

-
Event ID: 5000 -

Symbolic name:

-
-

MALWAREPROTECTION_RTP_ENABLED -

-
-

Message:

-
-

Real-time protection is enabled. -

-
-

Description:

-
-

Windows Defender Real-time Protection scanning for malware and other potentially unwanted software was enabled.

-
Event ID: 5001 -

Symbolic name:

-
-

MALWAREPROTECTION_RTP_DISABLED

-
-

Message:

-
-

Real-time protection is disabled. -

-
-

Description:

-
-

Windows Defender Real-time Protection scanning for malware and other potentially unwanted software was disabled.

-
Event ID: 5004 -

Symbolic name:

-
-

MALWAREPROTECTION_RTP_FEATURE_CONFIGURED -

-
-

Message:

-
-

The real-time protection configuration changed. -

-
-

Description:

-
-

-

Windows Defender Real-time Protection feature configuration has changed.

-
-
Feature: <Feature>, for example: -
    -
  • On Access
  • -
  • IE downloads and Outlook Express attachments
  • -
  • Behavior monitoring
  • -
  • Network Inspection System
  • -
-
-
Configuration:
-
-

-
Event ID: 5007 -

Symbolic name:

-
-

MALWAREPROTECTION_CONFIG_CHANGED -

-
-

Message:

-
-

The antimalware platform configuration changed.

-
-

Description:

-
-

-

Windows Defender Configuration has changed. If this is an unexpected event you should review the settings as this may be the result of malware.

-
-
Old value: <Old value number> -Old Windows Defender configuration value.
-
New value: <New value number> -New Windows Defender configuration value.
-
-

-
Event ID: 5008 -

Symbolic name:

-
-

MALWAREPROTECTION_ENGINE_FAILURE

-
-

Message:

-
-

The antimalware engine encountered an error and failed.

-
-

Description:

-
-

-

Windows Defender engine has been terminated due to an unexpected error.

-
-
Failure Type: <Failure type>, for example: -Crash -or Hang
-
Exception Code: <Error code>
-
Resource: <Resource>
-
-

-
-

User action:

-
-

To troubleshoot this event:

    -
  1. Try to restart the service.
      -
    • For antimalware, antivirus and spyware, at an elevated command prompt, type net stop msmpsvc, and then type net start msmpsvc to restart the antimalware engine.
    • -
    • For the Network Inspection System, at an elevated command prompt, type net start nissrv, and then type net start nissrv to restart the Network Inspection System engine by using the NiSSRV.exe file. -
    • -
    -
  2. -
  3. If it fails in the same way, look up the error code by accessing the Microsoft Support Site and entering the error number in the Search box, and contact Microsoft Technical Support.
  4. -
-

-
-

User action:

-
-

The Windows Defender client engine stopped due to an unexpected error.

-

To troubleshoot this event: -

    -
  1. Run the scan again.
  2. -
  3. If it fails in the same way, go to the Microsoft Support site, enter the error number in the Search box to look for the error code.
  4. -
  5. Contact Microsoft Technical Support. -
  6. -
-

-
Event ID: 5009 -

Symbolic name:

-
-

MALWAREPROTECTION_ANTISPYWARE_ENABLED -

-
-

Message:

-
-

Scanning for malware and other potentially unwanted software is enabled. -

-
-

Description:

-
-

Windows Defender scanning for malware and other potentially unwanted software has been enabled.

-
Event ID: 5010 -

Symbolic name:

-
-

MALWAREPROTECTION_ANTISPYWARE_DISABLED -

-
-

Message:

-
-

Scanning for malware and other potentially unwanted software is disabled.

-
-

Description:

-
-

Windows Defender scanning for malware and other potentially unwanted software is disabled.

-
Event ID: 5011 -

Symbolic name:

-
-

MALWAREPROTECTION_ANTIVIRUS_ENABLED

-
-

Message:

-
-

Scanning for viruses is enabled.

-
-

Description:

-
-

Windows Defender scanning for viruses has been enabled.

-
Event ID: 5012 -

Symbolic name:

-
-

MALWAREPROTECTION_ANTIVIRUS_DISABLED -

-
-

Message:

-
-

Scanning for viruses is disabled. -

-
-

Description:

-
-

Windows Defender scanning for viruses is disabled.

-
Event ID: 5100 -

Symbolic name:

-
-

MALWAREPROTECTION_EXPIRATION_WARNING_STATE -

-
-

Message:

-
-

The antimalware platform will expire soon. -

-
-

Description:

-
-

-

Windows Defender has entered a grace period and will soon expire. After expiration, this program will disable protection against viruses, spyware, and other potentially unwanted software.

-
-
Expiration Reason: The reason Windows Defender will expire.
-
Expiration Date: The date Windows Defender will expire.
-
-

-
Event ID: 5101 -

Symbolic name:

-
-

MALWAREPROTECTION_DISABLED_EXPIRED_STATE -

-
-

Message:

-
-

The antimalware platform is expired. -

-
-

Description::

-
-

-

Windows Defender grace period has expired. Protection against viruses, spyware, and other potentially unwanted software is disabled.

-
-
Expiration Reason:
-
Expiration Date:
-
Error Code: <Error code> -Result code associated with threat status. Standard HRESULT values.
-
Error Description: <Error description> -Description of the error.
-
-

-
- -## Windows Defender client error codes -If Windows Defender experiences any issues it will usually give you an error code to help you troubleshoot the issue. Most often an error means there was a problem installing an update. -This section provides the following information about Windows Defender client errors. -- The error code -- The possible reason for the error -- Advice on what to do now -Use the information in these tables to help troubleshoot Windows Defender error codes. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
External error codes
Error codeMessage displayedPossible reason for errorWhat to do now
-

0x80508007 -

-
-

ERR_MP_NO_MEMORY -

-
-

This error indicates that you might have run out of memory. -

-
-

-

    -
  1. Check the available memory on your device.
  2. -
  3. Close any unused applications that are running to free up memory on your device.
  4. -
  5. Restart the device and run the scan again. -
  6. -
-

-
-

0x8050800C

-
-

ERR_MP_BAD_INPUT_DATA

-
-

This error indicates that there might be a problem with your security product.

-
-

-

    -
  1. Update the definitions. Either:
      -
    1. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows Defender

      Or,

      -
    2. -
    3. Download the latest definitions from the Microsoft Malware Protection Center. -

      Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

      -
    4. -
    -
  2. -
  3. Run a full scan. -
  4. -
  5. Restart the device and try again.
  6. -
-

-
-

0x80508020

-
-

ERR_MP_BAD_CONFIGURATION -

-
-

This error indicates that there might be an engine configuration error; commonly, this is related to input -data that does not allow the engine to function properly. -

-
-

0x805080211 -

-
-

ERR_MP_QUARANTINE_FAILED -

-
-

This error indicates that Windows Defender failed to quarantine a threat. -

-
-

0x80508022 -

-
-

ERR_MP_REBOOT_REQUIRED -

-
-

This error indicates that a reboot is required to complete threat removal. -

-
-

0x80508023 -

-
-

ERR_MP_THREAT_NOT_FOUND -

-
-

This error indicates that the threat might no longer be present on the media, or malware might be stopping you from scanning your device. -

-
-

Run the Microsoft Safety Scanner then update your security software and try again. -

-
-

ERR_MP_FULL_SCAN_REQUIRED -

-
-

This error indicates that a full system scan might be required. -

-
-

Run a full system scan. -

-
-

0x80508024 -

-
-

0x80508025 -

-
-

ERR_MP_MANUAL_STEPS_REQUIRED -

-
-

This error indicates that manual steps are required to complete threat removal. -

-
-

Follow the manual remediation steps outlined in the Microsoft Malware Protection Encyclopedia. You can find a threat-specific link in the event history. -

-
-

0x80508026 -

-
-

ERR_MP_REMOVE_NOT_SUPPORTED -

-
-

This error indicates that removal inside the container type might not be not supported. -

-
-

Windows Defender is not able to remediate threats detected inside the archive. Consider manually removing the detected resources. -

-
-

0x80508027 -

-
-

ERR_MP_REMOVE_LOW_MEDIUM_DISABLED -

-
-

This error indicates that removal of low and medium threats might be disabled. -

-
-

Check the detected threats and resolve them as required. -

-
-

0x80508029 -

-
-

ERROR_MP_RESCAN_REQUIRED -

-
-

This error indicates a rescan of the threat is required. -

-
-

Run a full system scan. -

-
-

0x80508030 -

-
-

ERROR_MP_CALLISTO_REQUIRED -

-
-

This error indicates that an offline scan is required. -

-
-

Run Windows Defender Offline. You can read about how to do this in the Windows Defender Offline -article.

-
-

0x80508031 -

-
-

ERROR_MP_PLATFORM_OUTDATED -

-
-

This error indicates that Windows Defender does not support the current version of the platform and requires a new version of the platform. -

-
-

You can only use Windows Defender in Windows 10. For Windows 8, Windows 7 and Windows Vista, you can use System Center Endpoint Protection. -

-
-

 

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Internal error codes
Error codeMessage displayedPossible reason for errorWhat to do now
-

0x80501004

-
-

ERROR_MP_NO_INTERNET_CONN -

-
-

Check your Internet connection, then run the scan again.

-
-

Check your Internet connection, then run the scan again.

-
-

0x80501000

-
-

ERROR_MP_UI_CONSOLIDATION_BASE

-
-

This is an internal error. The cause is not clearly defined.

-
-

-

    -
  1. Update the definitions. Either:
      -
    1. Click the Update definitions button on the Update tab in Windows Defender. Update definitions in Windows Defender

      Or,

      -
    2. -
    3. Download the latest definitions from the Microsoft Malware Protection Center. -

      Note: The size of the definitions file downloaded from the Microsoft Malware Protection Center can exceed 60 MB and should not be used as a long-term solution for updating definitions.

      -
    4. -
    -
  2. -
  3. Run a full scan. -
  4. -
  5. Restart the device and try again.
  6. -
-

-
-

0x80501001

-
-

ERROR_MP_ACTIONS_FAILED

-
-

0x80501002

-
-

ERROR_MP_NOENGINE

-
-

0x80501003

-
-

ERROR_MP_ACTIVE_THREATS

-
-

0x805011011

-
-

MP_ERROR_CODE_LUA_CANCELLED

-
-

0x80501101

-
-

ERROR_LUA_CANCELLATION

-
-

0x80501102

-
-

MP_ERROR_CODE_ALREADY_SHUTDOWN

-
-

0x80501103

-
-

MP_ERROR_CODE_RDEVICE_S_ASYNC_CALL_PENDING

-
-

0x80501104

-
-

MP_ERROR_CODE_CANCELLED

-
-

0x80501105

-
-

MP_ERROR_CODE_NO_TARGETOS

-
-

0x80501106

-
-

MP_ERROR_CODE_BAD_REGEXP

-
-

0x80501107

-
-

MP_ERROR_TEST_INDUCED_ERROR

-
-

0x80501108

-
-

MP_ERROR_SIG_BACKUP_DISABLED

-
-

0x80508001

-
-

ERR_MP_BAD_INIT_MODULES

-
-

0x80508002

-
-

ERR_MP_BAD_DATABASE

-
-

0x80508004

-
-

ERR_MP_BAD_UFS

-
-

0x8050800C

-
-

ERR_MP_BAD_INPUT_DATA

-
-

0x8050800D

-
-

ERR_MP_BAD_GLOBAL_STORAGE

-
-

0x8050800E

-
-

ERR_MP_OBSOLETE

-
-

0x8050800F

-
-

ERR_MP_NOT_SUPPORTED

-
-

0x8050800F -0x80508010 -

-
-

ERR_MP_NO_MORE_ITEMS

-
-

0x80508011

-
-

ERR_MP_DUPLICATE_SCANID

-
-

0x80508012

-
-

ERR_MP_BAD_SCANID

-
-

0x80508013

-
-

ERR_MP_BAD_USERDB_VERSION

-
-

0x80508014

-
-

ERR_MP_RESTORE_FAILED

-
-

0x80508016

-
-

ERR_MP_BAD_ACTION

-
-

0x80508019

-
-

ERR_MP_NOT_FOUND

-
-

0x80509001

-
-

ERR_RELO_BAD_EHANDLE

-
-

0x80509003

-
-

ERR_RELO_KERNEL_NOT_LOADED

-
-

0x8050A001

-
-

ERR_MP_BADDB_OPEN

-
-

0x8050A002

-
-

ERR_MP_BADDB_HEADER

-
-

0x8050A003

-
-

ERR_MP_BADDB_OLDENGINE

-
-

0x8050A004

-
-

ERR_MP_BADDB_CONTENT

-
-

0x8050A005

-
-

ERR_MP_BADDB_NOTSIGNED

-
-

0x8050801

-
-

ERR_MP_REMOVE_FAILED

-
-

This is an internal error. It might be triggered when malware removal is not successful. -

-
-

0x80508018 -

-
-

ERR_MP_SCAN_ABORTED -

-
-

This is an internal error. It might have triggered when a scan fails to complete. -

-
- -## Related topics - -- [Configure Windows Defender in Windows 10](configure-windows-defender-in-windows-10.md) -- [Update and manage Windows Defender in Windows 10](get-started-with-windows-defender-for-windows-10.md) +This page has been redirected to *Troubleshoot Windows Defender Antivirus*. \ No newline at end of file diff --git a/windows/keep-secure/WDAV-working/use-group-policy-windows-defender-antivirus.md b/windows/keep-secure/use-group-policy-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/use-group-policy-windows-defender-antivirus.md rename to windows/keep-secure/use-group-policy-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/use-intune-config-manager-windows-defender-antivirus.md b/windows/keep-secure/use-intune-config-manager-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/use-intune-config-manager-windows-defender-antivirus.md rename to windows/keep-secure/use-intune-config-manager-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/use-powershell-cmdlets-windows-defender-antivirus.md b/windows/keep-secure/use-powershell-cmdlets-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/use-powershell-cmdlets-windows-defender-antivirus.md rename to windows/keep-secure/use-powershell-cmdlets-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/use-powershell-cmdlets-windows-defender-for-windows-10.md b/windows/keep-secure/use-powershell-cmdlets-windows-defender-for-windows-10.md similarity index 100% rename from windows/keep-secure/WDAV-working/use-powershell-cmdlets-windows-defender-for-windows-10.md rename to windows/keep-secure/use-powershell-cmdlets-windows-defender-for-windows-10.md diff --git a/windows/keep-secure/WDAV-working/use-wmi-windows-defender-antivirus.md b/windows/keep-secure/use-wmi-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/use-wmi-windows-defender-antivirus.md rename to windows/keep-secure/use-wmi-windows-defender-antivirus.md diff --git a/windows/keep-secure/WDAV-working/utilize-microsoft-cloud-protection-windows-defender-antivirus.md b/windows/keep-secure/utilize-microsoft-cloud-protection-windows-defender-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/utilize-microsoft-cloud-protection-windows-defender-antivirus.md rename to windows/keep-secure/utilize-microsoft-cloud-protection-windows-defender-antivirus.md diff --git a/windows/keep-secure/windows-defender-antivirus-in-windows-10.md b/windows/keep-secure/windows-defender-antivirus-in-windows-10.md index 7ad3e53061..b9a36aabbc 100644 --- a/windows/keep-secure/windows-defender-antivirus-in-windows-10.md +++ b/windows/keep-secure/windows-defender-antivirus-in-windows-10.md @@ -1,40 +1,51 @@ --- -title: Windows Defender in Windows 10 (Windows 10) -description: This topic provides an overview of Windows Defender, including a list of system requirements and new features. +title: Windows Defender Antivirus +description: Learn how to manage, configure, and use Windows Defender AV, the built-in antimalware and antivirus product available in Windows 10. +keywords: windows defender antivirus, windows defender, antimalware, scep, system center endpoint protection, system center configuration manager, virus, malware, threat, detection, protection, security ms.assetid: 6A9EB85E-1F3A-40AC-9A47-F44C4A2B55E2 ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: security localizationpriority: medium -author: jasesso +author: iaanw --- -# Windows Defender in Windows 10 +# Windows Defender Antivirus in Windows 10 **Applies to** - Windows 10 -Windows Defender in Windows 10 is a built-in antimalware solution that provides security and antimalware management for desktops, portable computers, and servers. -This topic provides an overview of Windows Defender, including a list of system requirements and new features. +Windows Defender Antivirus is a built-in antimalware solution that provides security and antimalware management for desktops, portable computers, and servers. -For more important information about running Windows Defender on a server platform, see [Windows Defender Overview for Windows Server Technical Preview](https://technet.microsoft.com/library/dn765478.aspx). +This library of documentation is aimed for enterprise security administrators who are either considering deployment, or have already deployed and are wanting to manage and configure Windows Defender AV on PC endpoints in their network. -Take advantage of Windows Defender by configuring settings and definitions using the following tools: -- Microsoft Active Directory *Group Policy* for settings -- Windows Server Update Services (WSUS) for definitions +For more important information about running Windows Defender on a server platform, see [Windows Defender Overview for Windows Server](https://technet.microsoft.com/library/dn765478.aspx). -Windows Defender provides the most protection when cloud-based protection is enabled. Learn how to enable cloud-based protection in [Configure Windows Defender in Windows 10](configure-windows-defender-in-windows-10.md). -> **Note:**  System Center 2012 R2 Configuration Manager SP1, System Center 2012 Configuration Manager SP2, and Microsoft Intune can provide centralized management of Windows Defender, including: -- Settings management -- Definition update management -- Alerts and alert management -- Reports and report management +## What's new in Windows 10, version 1703 -When you enable endpoint protection for your clients, it will install an additional management layer on Windows Defender to manage the in-box Windows Defender agent. While the client user interface will still appear as Windows Defender, the management layer for Endpoint Protection will be listed in the **Add/Remove Programs** control panel, though it will appear as if the full product is installed. +New features for Windows Defender AV in Windows 10, version 1703 include: +- [Updates to how the Block at First Sight feature can be configured](configure-block-at-first-sight-windows-defender-antivirus.md) +- [The ability to specify the level of cloud-protection](specify-cloud-protection-level-windows-defender-antivirus.md) +- [Windows Defender Antivirus protection in the Windows Defender Security Center app](windows-defender-security-center-antivirus.md) + +We've expanded this documentation library to cover end-to-end deployment, management, and configuration for Windows Defender AV, and we've added some new guides that can help with evaluating and deploying Windows Defender AV in certain scenarios: +- [Evaluation guide for Windows Defender AV](evaluate-windows-defender-antivirus.md) +- [Deployment guide for Windows Defender AV in a virtual desktop infrastructure environment](deployment-vdi-windows-defender-antivirus.md) + +See the [In this library](#in-this-library) list at the end of this topic for links to each of the updated sections in this library. -### Compatibility with Windows Defender Advanced Threat Protection +## Minimum system requirements + +Windows Defender has the same hardware requirements as Windows 10. For more information, see: +- [Minimum hardware requirements](https://msdn.microsoft.com/library/windows/hardware/dn915086.aspx) +- [Hardware component guidelines](https://msdn.microsoft.com/library/windows/hardware/dn915049.aspx) + + +Some features require a certain version of Windows 10 - the minimum version required is specified at the top of each topic. + +## Compatibility with Windows Defender Advanced Threat Protection Windows Defender Advanced Threat Protection (ATP) is an additional service that helps enterprises to detect, investigate, and respond to advanced persistent threats on their network. @@ -44,36 +55,20 @@ If you are enrolled in Windows Defender ATP, and you are not using Windows Defen In passive mode, Windows Defender will continue to run (using the *msmpeng.exe* process), and will continue to be updated, however there will be no Windows Defender user interface, scheduled scans won’t run, and Windows Defender will not provide real-time protection from malware. -You can [configure updates for Windows Defender](configure-windows-defender-in-windows-10.md), however you can't move Windows Defender into the normal active mode if your endpoints have an up-to-date third-party product providing real-time protection from malware. +You can still [manage updates for Windows Defender](manage-updates-baselines-windows-defender-antivirus.md), however you can't move Windows Defender into the normal active mode if your endpoints have an up-to-date third-party product providing real-time protection from malware. If you uninstall the other product, and choose to use Windows Defender to provide protection to your endpoints, Windows Defender will automatically return to its normal active mode.   -### Minimum system requirements - -Windows Defender has the same hardware requirements as Windows 10. For more information, see: -- [Minimum hardware requirements](https://msdn.microsoft.com/library/windows/hardware/dn915086.aspx) -- [Hardware component guidelines](https://msdn.microsoft.com/library/windows/hardware/dn915049.aspx) - -### New and changed functionality - -- **Improved detection for unwanted applications and emerging threats using cloud-based protection.** Use the Microsoft Active Protection Service to improve protection against unwanted applications and advanced persistent threats in your enterprise. -- **Windows 10 integration.** All Windows Defender in Windows 10 endpoints will show the Windows Defender user interface, even when the endpoint is managed. -- **Operating system, enterprise-level management, and bring your own device (BYOD) integration.** Windows 10 introduces a mobile device management (MDM) interface for devices running Windows 10. Administrators can use MDM-capable products, such as Intune, to manage Windows Defender on Windows 10 devices. - -For more information about what's new in Windows Defender in Windows 10, see [Windows Defender in Windows 10: System integration](https://www.microsoft.com/security/portal/enterprise/threatreports_august_2015.aspx) on the Microsoft Active Protection Service website. - -## In this section +## In this library Topic | Description :---|:--- -[Update and manage Windows Defender in Windows 10](get-started-with-windows-defender-for-windows-10.md)|Use Active Directory or Windows Server Update Services to manage and deploy updates to endpoints on your network. Configure and run special scans, including archive and email scans. -[Configure updates for Windows Defender in Windows 10](configure-windows-defender-in-windows-10.md)|Configure definition updates and cloud-based protection with Active Directory and Windows Server Update Services. -[Windows Defender Offline in Windows 10](windows-defender-offline.md)|Manually run an offline scan directly from winthin Windows without having to download and create bootable media. -[Use PowerShell cmdlets for Windows Defender](use-powershell-cmdlets-windows-defender-for-windows-10.md)|Run scans and configure Windows Defender options with Windows PowerShell cmdlets in Windows 10. -[Enable the Block at First Sight feature in Windows 10](windows-defender-block-at-first-sight.md)|Use the Block at First Sight feature to leverage the Windows Defender cloud. -[Configure enhanced notifications for Windows Defender in Windows 10](windows-defender-enhanced-notifications.md)|Enable or disable enhanced notifications on endpoints running Windows Defender for greater details about threat detections and removal. -[Run a Windows Defender scan from the command line](run-cmd-scan-windows-defender-for-windows-10.md)|Use the command-line utility to run a Windows Defender scan. -[Detect and block Potentially Unwanted Applications with Windows Defender](enable-pua-windows-defender-for-windows-10.md)|Use the Potentially Unwanted Application (PUA) feature in Managed Windows Defender to identify and block unwanted software during download and install time. -[Troubleshoot Windows Defender in Windows 10](troubleshoot-windows-defender-in-windows-10.md)|Review event IDs in Windows Defender for Windows 10 and take the appropriate actions. +[Evaluate Windows Defender Antivirus protection](evaluate-windows-defender-antivirus.md) | Evaluate the protection capabilities of Windows Defender Antivirus with a specialized evaluation guide and powershell script. +[Deploy, manage updates, and report on Windows Defender Antivirus](deploy-manage-report-windows-defender-antivirus.md) | While traditional client deployment is not required for Windows Defender AV, you will need to enable the service. You can also manage how protection and product updates are applies, and receive reports from Configuration Manager, Intune, and with some security information and event monitoring (SIEM) tools. +[Configure Windows Defender features](configure-windows-defender-antivirus-features.md) | Windows Defender AV has a large set of configurable features and options. You can use a number of management tools, including Group Policy, System Center Configuration Manager, Microsoft Intune, PowerShell cmdlets, and Windows Management Instrumentation (WMI). You can configure options such as cloud-delivered protection, always-on monitoring and scanning, and how end-users can interact or override global policy settings. +[Customize, initiate, and review the results of scans and remediation](customize-run-review-remediate-scans-windows-defender-antivirus.md) | You can set up scheduled scans, run on-demand scans, and configure how remediation works when threats are detected. +[Troubleshoot Windows Defender in Windows 10](troubleshoot-windows-defender-antivirus.md)|Review event IDs in Windows Defender Antivirus and take the appropriate actions. +[Reference topics for management and configuration tools](configuration-management-reference-windows-defender-antivirus.md)|The management and configuration tools that you can use with Windows Defender AV are listed and described here. + diff --git a/windows/keep-secure/WDAV-working/windows-defender-block-at-first-sight.md b/windows/keep-secure/windows-defender-block-at-first-sight.md similarity index 100% rename from windows/keep-secure/WDAV-working/windows-defender-block-at-first-sight.md rename to windows/keep-secure/windows-defender-block-at-first-sight.md diff --git a/windows/keep-secure/WDAV-working/windows-defender-enhanced-notifications.md b/windows/keep-secure/windows-defender-enhanced-notifications.md similarity index 100% rename from windows/keep-secure/WDAV-working/windows-defender-enhanced-notifications.md rename to windows/keep-secure/windows-defender-enhanced-notifications.md diff --git a/windows/keep-secure/WDAV-working/windows-defender-in-windows-10.md b/windows/keep-secure/windows-defender-in-windows-10.md similarity index 100% rename from windows/keep-secure/WDAV-working/windows-defender-in-windows-10.md rename to windows/keep-secure/windows-defender-in-windows-10.md diff --git a/windows/keep-secure/WDAV-working/windows-defender-offline.md b/windows/keep-secure/windows-defender-offline.md similarity index 100% rename from windows/keep-secure/WDAV-working/windows-defender-offline.md rename to windows/keep-secure/windows-defender-offline.md diff --git a/windows/keep-secure/WDAV-working/windows-defender-security-center-antivirus.md b/windows/keep-secure/windows-defender-security-center-antivirus.md similarity index 100% rename from windows/keep-secure/WDAV-working/windows-defender-security-center-antivirus.md rename to windows/keep-secure/windows-defender-security-center-antivirus.md