mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 03:43:39 +00:00
Merge pull request #859 from MicrosoftDocs/martyav-pua-updates
PUA updates - Part 1
This commit is contained in:
@ -11,6 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
audience: ITPro
|
||||||
ms.date: 10/02/2018
|
ms.date: 10/02/2018
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
@ -21,76 +22,93 @@ manager: dansimp
|
|||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
- [Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/microsoft-edge)
|
||||||
|
|
||||||
The potentially unwanted application (PUA) protection feature in Windows Defender Antivirus can detect and block PUAs on endpoints in your network.
|
Potentially unwanted applications are not considered viruses, malware, or other types of threats, but they might perform actions on endpoints which adversely affect endpoint performance or use. _PUA_ can also refer to an application that has a poor reputation, as assessed by Microsoft Defender ATP, due to certain kinds of undesirable behavior.
|
||||||
|
|
||||||
These applications are not considered viruses, malware, or other types of threats, but might perform actions on endpoints that adversely affect their performance or use. PUA can also refer to applications that are considered to have poor reputation.
|
For example:
|
||||||
|
|
||||||
Typical PUA behavior includes:
|
* **Advertising software:** Software that displays advertisements or promotions, including software that inserts advertisements to webpages.
|
||||||
|
* **Bundling software:** Software that offers to install other software that is not digitally signed by the same entity. Also, software that offers to install other software that qualify as PUA.
|
||||||
|
* **Evasion software:** Software that actively tries to evade detection by security products, including software that behaves differently in the presence of security products.
|
||||||
|
|
||||||
- Various types of software bundling
|
For more examples and a discussion of the criteria we use to label applications for special attention from security features, see [How Microsoft identifies malware and potentially unwanted applications](../intelligence/criteria.md).
|
||||||
- Ad injection into web browsers
|
|
||||||
- Driver and registry optimizers that detect issues, request payment to fix the errors, but remain on the endpoint and make no changes or optimizations (also known as "rogue antivirus" programs)
|
|
||||||
|
|
||||||
These applications can increase the risk of your network being infected with malware, cause malware infections to be harder to identify, and can waste IT resources in cleaning up the applications.
|
Potentially unwanted applications can increase the risk of your network being infected with actual malware, make malware infections harder to identify, or waste IT resources in cleaning them up.
|
||||||
|
|
||||||
>[!TIP]
|
|
||||||
>You can also visit the Microsoft Defender ATP demo website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works.
|
|
||||||
|
|
||||||
## How it works
|
## How it works
|
||||||
|
|
||||||
Windows Defender Antivirus blocks detected PUA files and attempts to download, move, run, or install them. Blocked PUA files are then moved to quarantined.
|
### Microsoft Edge
|
||||||
|
|
||||||
When a PUA is detected on an endpoint, Windows Defender Antivirus presents a notification to the user ([unless notifications have been disabled](configure-notifications-windows-defender-antivirus.md)) in the same format as normal threat detections (prefaced with "PUA:").
|
The next major version of Microsoft Edge, which is Chromium-based, blocks potentially unwanted application downloads and associated resource URLs. This feature is provided via [Windows Defender SmartScreen](../windows-defender-smartscreen/windows-defender-smartscreen-overview.md).
|
||||||
|
|
||||||
They will also appear in the usual [quarantine list in the Windows Security app](windows-defender-security-center-antivirus.md#detection-history).
|
#### Enable PUA protection in Chromium-based Microsoft Edge
|
||||||
|
|
||||||
## View PUA events
|
Although potentially unwanted application protection in Microsoft Edge (Chromium-based) is off by default, it can easily be turned on from within the browser.
|
||||||
|
|
||||||
PUA events are reported in the Windows Event Viewer, but not in System Center Configuration Manager or Intune.
|
1. From the tool bar, select **Settings and more** > **Settings**
|
||||||
|
1. Select **Privacy and services**
|
||||||
|
1. Under the **Services** section, you can toggle **Potentially unwanted app blocking** on or off
|
||||||
|
|
||||||
You can turn on email notifications for PUA detections.
|
> [!TIP]
|
||||||
|
> If you are running Microsoft Edge (Chromium-based), you can safely explore the URL-blocking feature of PUA protection by testing it out on one of our Windows Defender SmartScreen demo pages.
|
||||||
|
|
||||||
See [Troubleshoot event IDs](troubleshoot-windows-defender-antivirus.md) for details on viewing Windows Defender Antivirus events. PUA events are recorded under event ID 1160.
|
<!-- ^^ NOT currently up and running. From Matt Esquivel: "We need to add something to the test pages. [...] The URL I use now is: https://test.smartscreen.msft.net/urlrep_download/puaa_090_download_link.exe"-->
|
||||||
|
|
||||||
## Configure PUA protection
|
### Windows Defender Antivirus
|
||||||
|
|
||||||
You can enable PUA protection with Microsoft Intune, System Center Configuration Manager, Group Policy, or PowerShell cmdlets.
|
The potentially unwanted application (PUA) protection feature in Windows Defender Antivirus can detect and block PUAs on endpoints in your network.
|
||||||
|
|
||||||
You can also use the PUA audit mode to detect PUA without blocking them. The detections will be captured in the Windows event log.
|
> [!NOTE]
|
||||||
|
> This feature is only available in Windows 10.
|
||||||
|
|
||||||
This feature is useful if your company is conducting an internal software security compliance check and you'd like to avoid any false positives.
|
Windows Defender Antivirus blocks detected PUA files, and any attempts to download, move, run, or install them. Blocked PUA files are then moved to quarantine.
|
||||||
|
|
||||||
**Use Intune to configure PUA protection**
|
When a PUA is detected on an endpoint, Windows Defender Antivirus sends a notification to the user ([unless notifications have been disabled](configure-notifications-windows-defender-antivirus.md)) in the same format as other threat detections. The notification will be prefaced with _PUA:_ to indicate its content.
|
||||||
|
|
||||||
|
The notification will appear in the usual [quarantine list within the Windows Security app](windows-defender-security-center-antivirus.md#detection-history).
|
||||||
|
|
||||||
|
#### Configure PUA protection in Windows Defender Antivirus
|
||||||
|
|
||||||
|
You can enable PUA protection with Microsoft Intune, System Center Configuration Manager, Group Policy, or via PowerShell cmdlets.
|
||||||
|
|
||||||
|
You can also use the PUA audit mode to detect PUAs without blocking them. The detections will be captured in the Windows event log.
|
||||||
|
|
||||||
|
> [!TIP]
|
||||||
|
> You can visit the Microsoft Defender ATP demo website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com/Page/UrlRep) to confirm that the feature is working, and see it in action.
|
||||||
|
|
||||||
|
PUA audit mode is useful if your company is conducting an internal software security compliance check and you'd like to avoid any false positives.
|
||||||
|
|
||||||
|
##### Use Intune to configure PUA protection
|
||||||
|
|
||||||
See [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/intune/device-restrictions-configure) and [Windows Defender Antivirus device restriction settings for Windows 10 in Intune](https://docs.microsoft.com/intune/device-restrictions-windows-10#windows-defender-antivirus) for more details.
|
See [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/intune/device-restrictions-configure) and [Windows Defender Antivirus device restriction settings for Windows 10 in Intune](https://docs.microsoft.com/intune/device-restrictions-windows-10#windows-defender-antivirus) for more details.
|
||||||
|
|
||||||
**Use Configuration Manager to configure PUA protection:**
|
##### Use Configuration Manager to configure PUA protection
|
||||||
|
|
||||||
PUA protection is enabled by default in System Center Configuration Manager (current branch), including version 1606 and later.
|
PUA protection is enabled by default in the System Center Configuration Manager (current branch), starting with version 1606.
|
||||||
|
|
||||||
See [How to create and deploy antimalware policies: Scheduled scans settings](https://docs.microsoft.com/sccm/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings) for details on configuring System Center Configuration Manager (current branch).
|
See [How to create and deploy antimalware policies: Scheduled scans settings](https://docs.microsoft.com/sccm/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings) for details on configuring System Center Configuration Manager (current branch).
|
||||||
|
|
||||||
For Configuration Manager 2012, see [How to Deploy Potentially Unwanted Application Protection Policy for Endpoint Protection in Configuration Manager](https://technet.microsoft.com/library/hh508770.aspx#BKMK_PUA).
|
For Configuration Manager 2012, see [How to Deploy Potentially Unwanted Application Protection Policy for Endpoint Protection in Configuration Manager](https://technet.microsoft.com/library/hh508770.aspx#BKMK_PUA).
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> PUA events are reported in the Windows Event Viewer and not in System Center Configuration Manager.
|
> PUA events blocked by Windows Defender Antivirus are reported in the Windows Event Viewer and not in System Center Configuration Manager.
|
||||||
|
|
||||||
**Use Group Policy to configure PUA protection:**
|
##### Use Group Policy to configure PUA protection
|
||||||
|
|
||||||
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
|
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure, and select **Edit**.
|
||||||
|
|
||||||
2. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
2. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
|
||||||
|
|
||||||
3. Expand the tree to **Windows components > Windows Defender Antivirus**.
|
3. Expand the tree to **Windows components > Windows Defender Antivirus**.
|
||||||
|
|
||||||
4. Double-click **Configure protection for potentially unwanted applications**.
|
4. Double-click **Configure protection for potentially unwanted applications**.
|
||||||
|
|
||||||
5. Click **Enabled** to enable PUA protection.
|
5. Select **Enabled** to enable PUA protection.
|
||||||
|
|
||||||
6. In **Options**, select **Block** to block potentially unwanted applications, or select **Audit Mode** to test how the setting will work in your environment. Click **OK**.
|
6. In **Options**, select **Block** to block potentially unwanted applications, or select **Audit Mode** to test how the setting will work in your environment. Select **OK**.
|
||||||
|
|
||||||
**Use PowerShell cmdlets to configure PUA protection:**
|
##### Use PowerShell cmdlets to configure PUA protection
|
||||||
|
|
||||||
Use the following cmdlet:
|
Use the following cmdlet:
|
||||||
|
|
||||||
@ -98,12 +116,24 @@ Use the following cmdlet:
|
|||||||
Set-MpPreference -PUAProtection
|
Set-MpPreference -PUAProtection
|
||||||
```
|
```
|
||||||
|
|
||||||
Setting the value for this cmdlet to `Enabled` will turn the feature on if it has been disabled.
|
Setting the value for this cmdlet to `Enabled` will turn the feature on if it has been disabled.
|
||||||
|
|
||||||
Setting `AuditMode` will detect PUAs but will not block them.
|
Setting `AuditMode` will detect PUAs without blocking them.
|
||||||
|
|
||||||
See [Use PowerShell cmdlets to configure and run Windows Defender Antivirus](use-powershell-cmdlets-windows-defender-antivirus.md) and [Defender cmdlets](https://technet.microsoft.com/library/dn433280.aspx) for more information on how to use PowerShell with Windows Defender Antivirus.
|
See [Use PowerShell cmdlets to configure and run Windows Defender Antivirus](use-powershell-cmdlets-windows-defender-antivirus.md) and [Defender cmdlets](https://technet.microsoft.com/library/dn433280.aspx) for more information on how to use PowerShell with Windows Defender Antivirus.
|
||||||
|
|
||||||
|
#### View PUA events
|
||||||
|
|
||||||
|
PUA events are reported in the Windows Event Viewer, but not in System Center Configuration Manager or in Intune.
|
||||||
|
|
||||||
|
You can turn on email notifications to receive mail about PUA detections.
|
||||||
|
|
||||||
|
See [Troubleshoot event IDs](troubleshoot-windows-defender-antivirus.md) for details on viewing Windows Defender Antivirus events. PUA events are recorded under event ID **1160**.
|
||||||
|
|
||||||
|
#### Allow-listing apps
|
||||||
|
|
||||||
|
Sometimes a file is erroneously blocked by PUA protection, or a feature of a PUA is required to complete a task. In these cases, a file can be allow-listed. See [How to Configure Endpoint Protection in Configuration Manager](https://docs.microsoft.com/previous-versions/system-center/system-center-2012-R2/hh508770(v=technet.10)#to-exclude-specific-files-or-folders) for information on allowing files which are currently blocked by PUA protection in Windows Defender Antivirus.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Next gen protection](windows-defender-antivirus-in-windows-10.md)
|
- [Next gen protection](windows-defender-antivirus-in-windows-10.md)
|
||||||
|
@ -7,38 +7,41 @@ ms.mktglfcycl: explore
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
|
ms.author: macapara
|
||||||
|
audience: ITPro
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 07/27/2017
|
ms.date: 07/27/2017
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.author: macapara
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Defender SmartScreen
|
# Windows Defender SmartScreen
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
Windows Defender SmartScreen helps to protect your employees if they try to visit sites previously reported as phishing or malware websites, or if an employee tries to download potentially malicious files.
|
Windows Defender SmartScreen protects against phishing or malware websites, and the downloading of potentially malicious files.
|
||||||
|
|
||||||
**SmartScreen determines whether a site is potentially malicious by:**
|
**SmartScreen determines whether a site is potentially malicious by:**
|
||||||
|
|
||||||
- Analyzing visited webpages looking for indications of suspicious behavior. If it finds suspicious pages, SmartScreen shows a warning page, advising caution.
|
- Analyzing visited webpages, looking for indications of suspicious behavior. If SmartScreen determines that a page is suspicious, it will show a warning page to advise caution.
|
||||||
|
|
||||||
- Checking the visited sites against a dynamic list of reported phishing sites and malicious software sites. If it finds a match, SmartScreen shows a warning to let the user know that the site might be malicious.
|
- Checking visited sites against a dynamic list of reported phishing and malicious software sites. If SmartScreen finds a match, it will show a warning indicating that the site might be malicious.
|
||||||
|
|
||||||
**SmartScreen determines whether a downloaded app or app installer is potentially malicious by:**
|
**SmartScreen determines whether a downloaded app or app installer is potentially malicious by:**
|
||||||
|
|
||||||
- Checking downloaded files against a list of reported malicious software sites and programs known to be unsafe. If it finds a match, SmartScreen shows a warning to let the user know that the site might be malicious.
|
- Checking downloaded files against a list of reported malicious software sites and programs known to be unsafe. If SmartScreen finds a match, it will show a warning indicating that the site might be malicious.
|
||||||
|
|
||||||
- Checking downloaded files against a list of files that are well known and downloaded by many Windows users. If the file isn't on that list, SmartScreen shows a warning, advising caution.
|
- Checking downloaded files against a list of files that are well-known and downloaded by many Windows users. If the file isn't on that list, SmartScreen shows a warning, advising caution.
|
||||||
|
|
||||||
>[!NOTE]
|
> [!NOTE]
|
||||||
>Before Windows 10, version 1703 this feature was called the SmartScreen Filter when used within the browser and Windows SmartScreen when used outside of the browser.
|
> Before Windows 10, version 1703, this feature was called _the SmartScreen Filter_ when used within the browser and _Windows SmartScreen_ when used outside of the browser.
|
||||||
|
|
||||||
## Benefits of Windows Defender SmartScreen
|
## Benefits of Windows Defender SmartScreen
|
||||||
Windows Defender SmartScreen helps to provide an early warning system against websites that might engage in phishing attacks or attempt to distribute malware through a socially-engineered attack. The primary benefits are:
|
|
||||||
|
Windows Defender SmartScreen provide an early warning system against websites that might engage in phishing attacks or attempt to distribute malware through a socially-engineered attack. The primary benefits are:
|
||||||
|
|
||||||
- **Anti-phishing and anti-malware support.** SmartScreen helps to protect your employees from sites that are reported to host phishing attacks or attempt to distribute malicious software. It can also help protect against deceptive advertisements, scam sites, and drive-by attacks. Drive-by attacks are web-based attacks that tend to start on a trusted site, targeting security vulnerabilities in commonly-used software. Because drive-by attacks can happen even if the user does not click or download anything on the page, the danger often goes unnoticed. For more info about drive-by attacks, see [Evolving Microsoft SmartScreen to protect you from drive-by attacks](https://blogs.windows.com/msedgedev/2015/12/16/SmartScreen-drive-by-improvements/#3B7Bb8bzeAPq8hXE.97)
|
- **Anti-phishing and anti-malware support.** SmartScreen helps to protect your employees from sites that are reported to host phishing attacks or attempt to distribute malicious software. It can also help protect against deceptive advertisements, scam sites, and drive-by attacks. Drive-by attacks are web-based attacks that tend to start on a trusted site, targeting security vulnerabilities in commonly-used software. Because drive-by attacks can happen even if the user does not click or download anything on the page, the danger often goes unnoticed. For more info about drive-by attacks, see [Evolving Microsoft SmartScreen to protect you from drive-by attacks](https://blogs.windows.com/msedgedev/2015/12/16/SmartScreen-drive-by-improvements/#3B7Bb8bzeAPq8hXE.97)
|
||||||
|
|
||||||
@ -50,28 +53,27 @@ Windows Defender SmartScreen helps to provide an early warning system against we
|
|||||||
|
|
||||||
- **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info about all available settings, see [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md).
|
- **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info about all available settings, see [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md).
|
||||||
|
|
||||||
|
- **Blocking URLs associated with potentially unwanted applications.** In the next major version of Microsoft Edge (based on Chromium), SmartScreen will blocks URLs associated with potentially unwanted applications, or PUAs. For more information on blocking URLs associated with PUAs, see [Detect and block potentially unwanted applications](../windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md).
|
||||||
|
|
||||||
## Viewing Windows Defender SmartScreen anti-phishing events
|
## Viewing Windows Defender SmartScreen anti-phishing events
|
||||||
|
|
||||||
When Windows Defender SmartScreen warns or blocks an employee from a website, it's logged as [Event 1035 - Anti-Phishing](https://technet.microsoft.com/scriptcenter/dd565657(v=msdn.10).aspx).
|
When Windows Defender SmartScreen warns or blocks an employee from a website, it's logged as [Event 1035 - Anti-Phishing](https://technet.microsoft.com/scriptcenter/dd565657(v=msdn.10).aspx).
|
||||||
|
|
||||||
|
|
||||||
## Viewing Windows event logs for SmartScreen
|
## Viewing Windows event logs for SmartScreen
|
||||||
|
|
||||||
SmartScreen events appear in the Microsoft-Windows-SmartScreen/Debug log in Event Viewer.
|
SmartScreen events appear in the Microsoft-Windows-SmartScreen/Debug log in Event Viewer.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> For information on how to use the Event Viewer, see [Windows Event Viewer](https://docs.microsoft.com/host-integration-server/core/windows-event-viewer1).
|
> For information on how to use the Event Viewer, see [Windows Event Viewer](https://docs.microsoft.com/host-integration-server/core/windows-event-viewer1).
|
||||||
|
|
||||||
|EventID | Description |
|
EventID | Description
|
||||||
| :---: | :---: |
|
-|-
|
||||||
|1000 | Application SmartScreen Event|
|
1000 | Application SmartScreen Event
|
||||||
|1001 | Uri SmartScreen Event|
|
1001 | Uri SmartScreen Event
|
||||||
|1002 | User Decision SmartScreen Event|
|
1002 | User Decision SmartScreen Event
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [SmartScreen Frequently Asked Questions (FAQ)](https://feedback.smartscreen.microsoft.com/smartscreenfaq.aspx)
|
- [SmartScreen Frequently Asked Questions (FAQ)](https://feedback.smartscreen.microsoft.com/smartscreenfaq.aspx)
|
||||||
|
|
||||||
- [Threat protection](../index.md)
|
- [Threat protection](../index.md)
|
||||||
|
|
||||||
- [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings)
|
- [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings)
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md).
|
|
||||||
|
Reference in New Issue
Block a user