mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-23 14:23:38 +00:00
Merge pull request #1845 from MicrosoftDocs/tp-fix
update "Protect security settings with tamper protection"
This commit is contained in:
Binary file not shown.
After Width: | Height: | Size: 152 KiB |
Binary file not shown.
After Width: | Height: | Size: 141 KiB |
Binary file not shown.
After Width: | Height: | Size: 135 KiB |
Binary file not shown.
After Width: | Height: | Size: 262 KiB |
@ -35,15 +35,7 @@ With tamper protection, malicious apps are prevented from taking actions like th
|
|||||||
- Disabling cloud-delivered protection
|
- Disabling cloud-delivered protection
|
||||||
- Removing security intelligence updates
|
- Removing security intelligence updates
|
||||||
|
|
||||||
Tamper protection now integrates with [Threat & Vulnerability Management](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt). Security recommendations include a check to make sure tamper protection is turned on.
|
### How it works
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
In the results, you can select **Turn on Tamper Protection** to learn more and turn it on.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## How it works
|
|
||||||
|
|
||||||
Tamper protection essentially locks Windows Defender Antivirus and prevents your security settings from being changed through apps and methods like these:
|
Tamper protection essentially locks Windows Defender Antivirus and prevents your security settings from being changed through apps and methods like these:
|
||||||
- Configuring settings in Registry Editor on your Windows machine
|
- Configuring settings in Registry Editor on your Windows machine
|
||||||
@ -55,9 +47,15 @@ Tamper protection doesn't prevent you from viewing your security settings. And,
|
|||||||
|
|
||||||
### What do you want to do?
|
### What do you want to do?
|
||||||
|
|
||||||
[Turn tamper protection on (or off) for an individual machine using Windows Security](#turn-tamper-protection-on-or-off-for-an-individual-machine)
|
1. Turn tamper protection on <br/>
|
||||||
|
- [For an individual machine, use Windows Security](#turn-tamper-protection-on-or-off-for-an-individual-machine).
|
||||||
|
- [For your organization, use Intune](#turn-tamper-protection-on-or-off-for-your-organization-using-intune).
|
||||||
|
|
||||||
[Turn tamper protection on (or off) for your organization using Intune](#turn-tamper-protection-on-or-off-for-your-organization-using-intune)
|
2. [View information about tampering attempts](#view-information-about-tampering-attempts).
|
||||||
|
|
||||||
|
3. [Review your security recommendations](#review-your-security-recommendations).
|
||||||
|
|
||||||
|
4. [Browse the frequently asked questions](#view-information-about-tampering-attempts).
|
||||||
|
|
||||||
## Turn tamper protection on (or off) for an individual machine
|
## Turn tamper protection on (or off) for an individual machine
|
||||||
|
|
||||||
@ -76,6 +74,10 @@ If you are a home user, or you are not subject to settings managed by a security
|
|||||||
|
|
||||||
3. Set **Tamper Protection** to **On** or **Off**.
|
3. Set **Tamper Protection** to **On** or **Off**.
|
||||||
|
|
||||||
|
Here's what you see in the Windows Security app:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
## Turn tamper protection on (or off) for your organization using Intune
|
## Turn tamper protection on (or off) for your organization using Intune
|
||||||
|
|
||||||
If you are part of your organization's security team, you can turn tamper protection on (or off) for your organization in the Microsoft 365 Device Management portal (Intune). (This feature is rolling out now; if you don't have it yet, you should very soon, assuming your organization has [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md) (Microsoft Defender ATP) and that you meet the prerequisites listed below.)
|
If you are part of your organization's security team, you can turn tamper protection on (or off) for your organization in the Microsoft 365 Device Management portal (Intune). (This feature is rolling out now; if you don't have it yet, you should very soon, assuming your organization has [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md) (Microsoft Defender ATP) and that you meet the prerequisites listed below.)
|
||||||
@ -86,29 +88,37 @@ You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-
|
|||||||
|
|
||||||
- Your organization must have [Microsoft Defender ATP E5](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp) (this is included in Microsoft 365 E5. See [Microsoft 365 Enterprise overview](https://docs.microsoft.com/microsoft-365/enterprise/microsoft-365-overview) for more details.)
|
- Your organization must have [Microsoft Defender ATP E5](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp) (this is included in Microsoft 365 E5. See [Microsoft 365 Enterprise overview](https://docs.microsoft.com/microsoft-365/enterprise/microsoft-365-overview) for more details.)
|
||||||
- Your organization's devices must be managed by [Intune](https://docs.microsoft.com/intune/device-management-capabilities).
|
- Your organization's devices must be managed by [Intune](https://docs.microsoft.com/intune/device-management-capabilities).
|
||||||
- Your Windows machines must be running [Windows OS 1709](https://docs.microsoft.com/windows/release-information/status-windows-10-1709) or later.
|
- Your Windows machines must be running Windows OS [1709](https://docs.microsoft.com/windows/release-information/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-information/status-windows-10-1803), [1809](https://docs.microsoft.com/windows/release-information/status-windows-10-1809-and-windows-server-2019) or later. (See [Windows 10 release information](https://docs.microsoft.com/windows/release-information/) for more details about releases.)
|
||||||
- You must be using Windows security with [security intelligence](https://www.microsoft.com/wdsi/definitions) updated to version 1.287.60.0 (or above)
|
- You must be using Windows security with [security intelligence](https://www.microsoft.com/wdsi/definitions) updated to version 1.287.60.0 (or above).
|
||||||
- Your machines must be using anti-malware platform version 4.18.1906.3 (or above) and anti-malware engine version 1.1.15500.X (or above). (See [Manage Windows Defender Antivirus updates and apply baselines](manage-updates-baselines-windows-defender-antivirus.md).)
|
- Your machines must be using anti-malware platform version 4.18.1906.3 (or above) and anti-malware engine version 1.1.15500.X (or above). (See [Manage Windows Defender Antivirus updates and apply baselines](manage-updates-baselines-windows-defender-antivirus.md).)
|
||||||
|
|
||||||
2. Go to the Microsoft 365 Device Management portal ([https://devicemanagement.microsoft.com](https://devicemanagement.microsoft.com)) and sign in with your work or school account.
|
2. Go to the Microsoft 365 Device Management portal ([https://devicemanagement.microsoft.com](https://devicemanagement.microsoft.com)) and sign in with your work or school account.
|
||||||
|
|
||||||
3. Select **Device configuration** > **Profiles**.
|
3. Select **Device configuration** > **Profiles**.
|
||||||
|
|
||||||
4. Create a profile that includes the following settings:
|
4. Create a profile as follows:
|
||||||
|
|
||||||
- **Platform**: Windows 10 and later
|
- Platform: **Windows 10 and later**
|
||||||
|
|
||||||
- **ProfileType**: Endpoint protection
|
- Profile type: **Endpoint protection**
|
||||||
|
|
||||||
- **Settings** > Windows Defender Security Center > Tamper Protection
|
- Category: **Microsoft Defender Security Center**
|
||||||
|
|
||||||
|
- Tamper Protection: **Enabled**
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
5. Assign the profile to one or more groups.
|
5. Assign the profile to one or more groups.
|
||||||
|
|
||||||
### Are you using Windows OS 1709?
|
Here's what you see in the Windows Security app:
|
||||||
|
|
||||||
If you are using Windows OS 1709, you don't have the Windows Security app on your computer. In this case, the one of the following procedures to determine whether tamper protection is enabled.
|

|
||||||
|
|
||||||
#### To determine whether tamper protection is turned on by using PowerShell
|
### Are you using Windows OS 1709, 1803, or 1809?
|
||||||
|
|
||||||
|
If you are using Windows OS [1709](https://docs.microsoft.com/windows/release-information/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-information/status-windows-10-1803), or [1809](https://docs.microsoft.com/windows/release-information/status-windows-10-1809-and-windows-server-2019), you won't see **Tamper Protection** in the Windows Security app. In this case, the one of the following procedures to determine whether tamper protection is enabled.
|
||||||
|
|
||||||
|
#### Use PowerShell to determine whether tamper protection is turned
|
||||||
|
|
||||||
1. Open the Windows PowerShell app.
|
1. Open the Windows PowerShell app.
|
||||||
|
|
||||||
@ -116,7 +126,7 @@ If you are using Windows OS 1709, you don't have the Windows Security app on you
|
|||||||
|
|
||||||
3. In the list of results, look for `IsTamperProtected`. (A value of *true* means tamper protection is enabled.)
|
3. In the list of results, look for `IsTamperProtected`. (A value of *true* means tamper protection is enabled.)
|
||||||
|
|
||||||
#### To determine whether tamper protection is turned on by viewing a registry key
|
#### View a registry key value to determine whether tamper protection is turned on
|
||||||
|
|
||||||
1. Open the Registry Editor app.
|
1. Open the Registry Editor app.
|
||||||
|
|
||||||
@ -126,11 +136,33 @@ If you are using Windows OS 1709, you don't have the Windows Security app on you
|
|||||||
- If you see **TamperProtection** with a value of **0**, tamper protection is not turned on.
|
- If you see **TamperProtection** with a value of **0**, tamper protection is not turned on.
|
||||||
- If you do not see **TamperProtection** at all, tamper protection is not turned on.
|
- If you do not see **TamperProtection** at all, tamper protection is not turned on.
|
||||||
|
|
||||||
|
## View information about tampering attempts
|
||||||
|
|
||||||
|
Tampering attempts typically indicate bigger cyberattacks. Bad actors try to change security settings as a way to persist and stay undetected. If you're part of your organization's security team, you can view information about such attempts, and then take appropriate actions to mitigate threats.
|
||||||
|
|
||||||
|
When a tampering attempt is detected, an alert is raised in the [Microsoft Defender Security Center](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/portal-overview) ([https://securitycenter.windows.com](https://securitycenter.windows.com)).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Using [endpoint detection and response](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response) and [advanced hunting](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview) capabilities in Microsoft Defender ATP, your security operations team can investigate and address such attempts.
|
||||||
|
|
||||||
|
## Review your security recommendations
|
||||||
|
|
||||||
|
Tamper protection integrates with [Threat & Vulnerability Management](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) capabilities. [Security recommendations](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation) include making sure tamper protection is turned on. For example, you can search on *tamper*, as shown in the following image:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
In the results, you can select **Turn on Tamper Protection** to learn more and turn it on.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
To learn more about Threat & Vulnerability Management, see [Threat & Vulnerability Management in Microsoft Defender Security Center](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-dashboard-insights#threat--vulnerability-management-in-microsoft-defender-security-center).
|
||||||
|
|
||||||
## Frequently asked questions
|
## Frequently asked questions
|
||||||
|
|
||||||
### To which Windows OS versions is configuring tamper protection is applicable?
|
### To which Windows OS versions is configuring tamper protection is applicable?
|
||||||
|
|
||||||
[Windows 1709](https://docs.microsoft.com/windows/release-information/status-windows-10-1709) or later together with [Microsoft Defender Advanced Threat Protection E5](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp).
|
Windows OS [1709](https://docs.microsoft.com/windows/release-information/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-information/status-windows-10-1803), [1809](https://docs.microsoft.com/windows/release-information/status-windows-10-1809-and-windows-server-2019), or later together with [Microsoft Defender Advanced Threat Protection E5](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp).
|
||||||
|
|
||||||
### Is configuring tamper protection in Intune supported on servers?
|
### Is configuring tamper protection in Intune supported on servers?
|
||||||
|
|
||||||
@ -138,7 +170,7 @@ No
|
|||||||
|
|
||||||
### Will tamper protection have any impact on third party antivirus registration?
|
### Will tamper protection have any impact on third party antivirus registration?
|
||||||
|
|
||||||
No, third-party antivirus will continue to register with the Windows Security application.
|
No. Third-party antivirus offerings will continue to register with the Windows Security application.
|
||||||
|
|
||||||
### What happens if Windows Defender Antivirus is not active on a device?
|
### What happens if Windows Defender Antivirus is not active on a device?
|
||||||
|
|
||||||
@ -150,11 +182,9 @@ If you are a home user, see [Turn tamper protection on (or off) for an individua
|
|||||||
|
|
||||||
If you are an organization using [Microsoft Defender ATP E5](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp), you should be able to manage tamper protection in Intune similar to how you manage other endpoint protection features. See [Turn tamper protection on (or off) for your organization using Intune](#turn-tamper-protection-on-or-off-for-your-organization-using-intune).
|
If you are an organization using [Microsoft Defender ATP E5](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp), you should be able to manage tamper protection in Intune similar to how you manage other endpoint protection features. See [Turn tamper protection on (or off) for your organization using Intune](#turn-tamper-protection-on-or-off-for-your-organization-using-intune).
|
||||||
|
|
||||||
|
|
||||||
### How does configuring tamper protection in Intune affect how I manage Windows Defender Antivirus through my group policy?
|
### How does configuring tamper protection in Intune affect how I manage Windows Defender Antivirus through my group policy?
|
||||||
|
|
||||||
Your regular group policy doesn’t apply to tamper protection, and changes to Windows Defender Antivirus settings will be ignored when tamper protection is on.
|
Your regular group policy doesn’t apply to tamper protection, and changes to Windows Defender Antivirus settings are ignored when tamper protection is on.
|
||||||
|
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>A small delay in Group Policy (GPO) processing may occur if Group Policy settings include values that control Windows Defender Antivirus features protected by tamper protection. To avoid any potential delays, we recommend that you remove settings that control Windows Defender Antivirus related behavior from GPO and simply allow tamper protection to protect Windows Defender Antivirus settings. <br><br>
|
>A small delay in Group Policy (GPO) processing may occur if Group Policy settings include values that control Windows Defender Antivirus features protected by tamper protection. To avoid any potential delays, we recommend that you remove settings that control Windows Defender Antivirus related behavior from GPO and simply allow tamper protection to protect Windows Defender Antivirus settings. <br><br>
|
||||||
@ -166,14 +196,13 @@ Value DisableAntiSpyware = 0 <br><br>
|
|||||||
Computer Configuration\Administrative Templates\Windows Components\Windows Defender Antivirus\Real-time Protection\
|
Computer Configuration\Administrative Templates\Windows Components\Windows Defender Antivirus\Real-time Protection\
|
||||||
Value DisableRealtimeMonitoring = 0
|
Value DisableRealtimeMonitoring = 0
|
||||||
|
|
||||||
|
|
||||||
### For Microsoft Defender ATP E5, is configuring tamper protection in Intune targeted to the entire organization only?
|
### For Microsoft Defender ATP E5, is configuring tamper protection in Intune targeted to the entire organization only?
|
||||||
|
|
||||||
Configuring tamper protection in Intune can be targeted to your entire organization as well as to devices and user groups with Intune.
|
Configuring tamper protection in Intune can be targeted to your entire organization as well as to specific devices and user groups.
|
||||||
|
|
||||||
### Can I configure tamper protection in System Center Configuration Manager?
|
### Can I configure tamper protection in System Center Configuration Manager?
|
||||||
|
|
||||||
Currently we do not have support to manage tamper protection through System Center Configuration Manager.
|
Currently, managing tamper protection through System Center Configuration Manager is not supported.
|
||||||
|
|
||||||
### I have the Windows E3 enrollment. Can I use configuring tamper protection in Intune?
|
### I have the Windows E3 enrollment. Can I use configuring tamper protection in Intune?
|
||||||
|
|
||||||
@ -181,7 +210,7 @@ Currently, configuring tamper protection in Intune is only available for custome
|
|||||||
|
|
||||||
### What happens if I try to change Microsoft Defender ATP settings in Intune, System Center Configuration Manager, and Windows Management Instrumentation when tamper protection is enabled on a device?
|
### What happens if I try to change Microsoft Defender ATP settings in Intune, System Center Configuration Manager, and Windows Management Instrumentation when tamper protection is enabled on a device?
|
||||||
|
|
||||||
You won’t be able to change the features that are protected by tamper protection; those change requests are ignored.
|
You won’t be able to change the features that are protected by tamper protection; such change requests are ignored.
|
||||||
|
|
||||||
### I’m an enterprise customer. Can local admins change tamper protection on their devices?
|
### I’m an enterprise customer. Can local admins change tamper protection on their devices?
|
||||||
|
|
||||||
@ -199,16 +228,16 @@ In addition, your security operations team can use hunting queries, such as the
|
|||||||
|
|
||||||
`AlertEvents | where Title == "Tamper Protection bypass"`
|
`AlertEvents | where Title == "Tamper Protection bypass"`
|
||||||
|
|
||||||
|
[View information about tampering attempts](#view-information-about-tampering-attempts).
|
||||||
|
|
||||||
### Will there be a group policy setting for tamper protection?
|
### Will there be a group policy setting for tamper protection?
|
||||||
|
|
||||||
No.
|
No.
|
||||||
|
|
||||||
## Related resources
|
## Related articles
|
||||||
|
|
||||||
[Windows 10 Enterprise Security](https://docs.microsoft.com/windows/security/index)
|
|
||||||
|
|
||||||
[Help secure Windows PCs with Endpoint Protection for Microsoft Intune](https://docs.microsoft.com/intune/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune)
|
[Help secure Windows PCs with Endpoint Protection for Microsoft Intune](https://docs.microsoft.com/intune/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune)
|
||||||
|
|
||||||
[Microsoft 365 Enterprise overview (at a glance)](https://docs.microsoft.com/microsoft-365/enterprise/microsoft-365-overview#at-a-glance)
|
[Get an overview of Microsoft Defender ATP E5](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp)
|
||||||
|
|
||||||
[Microsoft Defender ATP E5](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp)
|
[Better together: Windows Defender Antivirus and Microsoft Defender Advanced Threat Protection](why-use-microsoft-antivirus.md)
|
||||||
|
Reference in New Issue
Block a user