mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 10:53:43 +00:00
notes
This commit is contained in:
@ -23,8 +23,8 @@ For a list of the cmdlets and their functions and available parameters, see the
|
||||
|
||||
PowerShell cmdlets are most useful in Windows Server environments that don't rely on a graphical user interface (GUI) to configure software.
|
||||
|
||||
>[!NOTE]
|
||||
PowerShell cmdlets should not be used as a replacement for a full network policy management infrastructure, such as [System Center Configuration Manager](https://technet.microsoft.com/en-us/library/gg682129.aspx), [Group Policy Management Console](https://technet.microsoft.com/en-us/library/cc731212.aspx), or [Windows Defender Group Policy ADMX templates](https://support.microsoft.com/en-us/kb/927367).
|
||||
> [!NOTE]
|
||||
> PowerShell cmdlets should not be used as a replacement for a full network policy management infrastructure, such as [System Center Configuration Manager](https://technet.microsoft.com/en-us/library/gg682129.aspx), [Group Policy Management Console](https://technet.microsoft.com/en-us/library/cc731212.aspx), or [Windows Defender Group Policy ADMX templates](https://support.microsoft.com/en-us/kb/927367).
|
||||
|
||||
PowerShell is typically installed under the folder _%SystemRoot%\system32\WindowsPowerShell_.
|
||||
|
||||
@ -33,8 +33,8 @@ PowerShell is typically installed under the folder _%SystemRoot%\system32\Window
|
||||
|
||||
1. Click **Start**, type **powershell**, and press **Enter**.
|
||||
2. Click **Windows PowerShell** to open the interface.
|
||||
>[!NOTE]
|
||||
You may need to open an administrator-level version of PowerShell. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt.
|
||||
> [!NOTE]
|
||||
> You may need to open an administrator-level version of PowerShell. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt.
|
||||
3. Enter the command and parameters.
|
||||
|
||||
To open online help for any of the cmdlets type the following:
|
||||
|
@ -31,8 +31,8 @@ If the Block at First Sight feature is enabled on the client, the file will be l
|
||||
|
||||
The file-based determination typically takes 1 to 4 seconds.
|
||||
|
||||
>[!NOTE]
|
||||
Suspicious file downloads requiring additional backend processing to reach a determination will be locked by Windows Defender on the first machine where the file is encountered, until it is finished uploading to the backend. Users will see a longer "Running security scan" message in the browser while the file is being uploaded. This might result in what appear to be slower download times for some files.
|
||||
> [!NOTE]
|
||||
> Suspicious file downloads requiring additional backend processing to reach a determination will be locked by Windows Defender on the first machine where the file is encountered, until it is finished uploading to the backend. Users will see a longer "Running security scan" message in the browser while the file is being uploaded. This might result in what appear to be slower download times for some files.
|
||||
|
||||
|
||||
## Enable Block at First Sight
|
||||
@ -63,8 +63,8 @@ Block at First Sight requires a number of Group Policy settings to be configured
|
||||
|
||||
1. Send all samples (3)
|
||||
|
||||
>[!NOTE]
|
||||
Setting to 0 (Always Prompt) will lower the protection state of the device. Setting to 2 (Never send) means the "Block at First Sight" feature will not function.
|
||||
> [!NOTE]
|
||||
> Setting to 0 (Always Prompt) will lower the protection state of the device. Setting to 2 (Never send) means the "Block at First Sight" feature will not function.
|
||||
|
||||
1. Click OK after both Group Policies have been set.
|
||||
|
||||
@ -88,8 +88,8 @@ Block at First Sight requires a number of Group Policy settings to be configured
|
||||
|
||||
1. Double-click the **Configure the <20>Block at First Sight<68> feature** setting and set the option to **Enabled**.
|
||||
|
||||
>[!NOTE]
|
||||
The Block at First Sight feature will not function if the pre-requisite group policies have not been correctly set.
|
||||
> [!NOTE]
|
||||
> The Block at First Sight feature will not function if the pre-requisite group policies have not been correctly set.
|
||||
|
||||
### Manually enable Block at First Sight on Individual clients
|
||||
|
||||
@ -105,8 +105,8 @@ To configure un-managed clients that are running Windows 10, Block at First Sigh
|
||||
|
||||
2. Switch **Cloud-based Protection** and **Automatic sample submission** to **On**.
|
||||
|
||||
>[!NOTE]
|
||||
These settings will be overridden if the network administrator has configured their associated Group Policies. The settings will appear grayed out and you will not be able to modify them if they are being managed by Group Policy.
|
||||
> [!NOTE]
|
||||
> These settings will be overridden if the network administrator has configured their associated Group Policies. The settings will appear grayed out and you will not be able to modify them if they are being managed by Group Policy.
|
||||
|
||||
## Related topics
|
||||
|
||||
|
@ -31,8 +31,8 @@ For more information about Windows 10 requirements, see the following topics:
|
||||
|
||||
- [Hardware component guidelines](https://msdn.microsoft.com/library/windows/hardware/dn915049(v=vs.85).aspx)
|
||||
|
||||
>[!NOTE]
|
||||
Windows Defender Offline is not supported on machines with ARM processors, or on Windows Server Stock Keeping Units.
|
||||
> [!NOTE]
|
||||
> Windows Defender Offline is not supported on machines with ARM processors, or on Windows Server Stock Keeping Units.
|
||||
|
||||
To run Windows Defender Offline from the endpoint, the user must be logged in with administrator privileges.
|
||||
|
||||
@ -40,8 +40,8 @@ To run Windows Defender Offline from the endpoint, the user must be logged in wi
|
||||
|
||||
Windows Defender Offline uses the most up-to-date signature definitions available on the endpoint; it's updated whenever Windows Defender is updated with new signature definitions. Depending on your setup, this is usually though Microsoft Update or through the [Microsoft Malware Protection Center](https://www.microsoft.com/security/portal/definitions/adl.aspx).
|
||||
|
||||
>[!NOTE]
|
||||
Before running an offline scan, you should attempt to update the definitions on the endpoint. You can either force an update via Group Policy or however you normally deploy updates to endpoints, or you can manually download and install the latest updates from the [Microsoft Malware Protection Center](https://www.microsoft.com/security/portal/definitions/adl.aspx).
|
||||
> [!NOTE]
|
||||
> Before running an offline scan, you should attempt to update the definitions on the endpoint. You can either force an update via Group Policy or however you normally deploy updates to endpoints, or you can manually download and install the latest updates from the [Microsoft Malware Protection Center](https://www.microsoft.com/security/portal/definitions/adl.aspx).
|
||||
|
||||
For information on setting up Windows Defender updates, see the [Configure Windows Defender in Windows 10](configure-windows-defender-in-windows-10.md) topic.
|
||||
|
||||
@ -66,8 +66,8 @@ In Configuration Manager, you can identify the status of endpoints by navigating
|
||||
|
||||
You can suppress Windows Defender Offline notifications with Group Policy.
|
||||
|
||||
>[!NOTE]
|
||||
Changing these settings will affect *all* notifications from Windows Defender. Disabling notifications will mean the endpoint user will not see any messages about any threats detected, removed, or if additional steps are required.
|
||||
> [!NOTE]
|
||||
> Changing these settings will affect *all* notifications from Windows Defender. Disabling notifications will mean the endpoint user will not see any messages about any threats detected, removed, or if additional steps are required.
|
||||
|
||||
**Use Group Policy to suppress Windows Defender notifications:**
|
||||
|
||||
@ -97,8 +97,8 @@ For more information about notifications in Windows Defender, see the [Configure
|
||||
|
||||
Windows Defender Offline uses up-to-date threat definitions to scan the endpoint for malware that might be hidden. In Windows 10, version 1607, you can manually force an offline scan using Windows Update and Security settings.
|
||||
|
||||
>[!NOTE]
|
||||
Before you use Windows Defender Offline, make sure you save any files and shut down running programs. The Windows Defender Offline scan takes about 15 minutes to run. It will restart the endpoint when the scan is complete.
|
||||
> [!NOTE]
|
||||
> Before you use Windows Defender Offline, make sure you save any files and shut down running programs. The Windows Defender Offline scan takes about 15 minutes to run. It will restart the endpoint when the scan is complete.
|
||||
|
||||
You can set up a Windows Defender Offline scan with the following:
|
||||
|
||||
@ -112,8 +112,8 @@ You can set up a Windows Defender Offline scan with the following:
|
||||
|
||||
- Group Policy
|
||||
|
||||
>[!NOTE]
|
||||
The scan is performed outside of the usual Windows operating environment. The user interface will appear different to a normal scan performed by Windows Defender. After the scan is completed, the endpoint will be restarted and Windows will load normally.
|
||||
> [!NOTE]
|
||||
> The scan is performed outside of the usual Windows operating environment. The user interface will appear different to a normal scan performed by Windows Defender. After the scan is completed, the endpoint will be restarted and Windows will load normally.
|
||||
|
||||
**Run Windows Defender Offline from Windows Settings:**
|
||||
|
||||
|
Reference in New Issue
Block a user