diff --git a/windows/keep-secure/TOC.md b/windows/keep-secure/TOC.md index 0138ce287c..72c4e125b5 100644 --- a/windows/keep-secure/TOC.md +++ b/windows/keep-secure/TOC.md @@ -757,6 +757,69 @@ #### [Run a Windows Defender scan from the command line](run-cmd-scan-windows-defender-for-windows-10.md) #### [Detect and block Potentially Unwanted Applications with Windows Defender](enable-pua-windows-defender-for-windows-10.md) #### [Troubleshoot Windows Defender in Windows 10](troubleshoot-windows-defender-in-windows-10.md) +### [Windows Defender Antivirus] +#### [Requirements for Windows Defender Antivirus] +#### [Data collection and privacy in Windows Defender Antivirus] +#### [Evaluate Windows Defender Antivirus protection] +##### [Evaluation Guide for Windows Defender Antivirus] +#### [Deploy, manage, and report on Windows Defender Antivirus] +##### [Deploy WDAM from a managed Windows 10 endpoint] +###### [Use Azure Active Directory and group policy to deploy Windows Defender Antivirus] +###### [Use System Center Configuration Manager to deploy Windows Defender Antivirus] +###### [Use Windows Management Instrumentation (WMI) and PowerShell to deploy Windows Defender Antivirus] +###### [Use Intune to to deploy Windows Defender Antivirus] +##### [Report on Windows Defender Antivirus protection] +###### [Use Microsoft Operations Management Suite to monitor Windows Defender Antivirus] +###### [Use System Center Configuration Manager to monitor Windows Defender Antivirus] +###### [Use Azure Active Directory to monitor Windows Defender Antivirus] +###### [Use the Windows Defender App to monitor Windows Defender Antivirus] +##### [Use the Integrated threat protection management system (8227874)] +##### [Manage end-user interaction with WDAM] +###### [Configure the types of notifications that end-users see] +###### [Prevent users from seeing or interacting with the WDAM user interface] +###### [Prevent users from modifying cloud protection features] +###### [Prevent users from modifying scan settings] +#### [Configure Windows Defender features] +##### [Configure update options for Windows Defender Anti-Malware] +###### [Configure endpoint product updates] +###### [Configure protection (definition) updates] +####### [Definition update logic] +####### [Update WDAM protection with AAD, SCCM, or Intune] +##### [Utilize Microsoft cloud protection] +###### [Enable cloud protection] +####### [Specify the cloud protection level for WDAM] +####### [Configure network connections for cloud protection] +###### [Configure the cloud block timeout period] +###### [Configure the block at first sight feature] +##### [Configure behavioral, heuristic, and real-time protection] +###### [Detect and block potentially unwanted software] +###### [Use behavioral, heuristic, and real-time protection] +##### [Security profiles] +#### [Customize and initiate scans] +##### [Customize scanning options] +###### [Exclude files and processes from scans] +###### [Configure email, removable storage, network, reparse point, and archive scanning] +###### [Configure remediation for scans] +##### [Initiate and review the results of scans] +###### [Schedule scans] +###### [Run an on-demand scan] +###### [Run a scan from the command line] +###### [Run and review the results of a Windows Defender Offline scan] +#### [Troubleshoot Windows Defender Antivirus issues] +##### [WDAM client event IDs] +##### [WDAM client error codes] +##### [Resolving endpoint remediation issues] +##### [Decision tree for troubleshooting various issues] +#### [Reference topics] +##### [Sample configuration policies] +###### [ADM, ADMX, and GPO templates] +###### [Sample Intune policies] +###### [Sample SCCM policies] +##### [WMI classes] +##### [Use PowerShell cmdlets for Windows Defender Antivirus] +##### [Command line arguments] +##### [The TAP program] + ### [Windows Firewall with Advanced Security](windows-firewall-with-advanced-security.md) #### [Isolating Windows Store Apps on Your Network](isolating-apps-on-your-network.md) #### [Securing End-to-End IPsec Connections by Using IKEv2 in Windows Server 2012](securing-end-to-end-ipsec-connections-by-using-ikev2.md)