mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-29 05:37:22 +00:00
Merge branch 'master' into App-v-revision
This commit is contained in:
commit
f4515ae458
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 04/30/2018
|
ms.date: 07/10/2018
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -68,11 +68,9 @@ See [How to create and deploy antimalware policies: Scan settings]( https://docs
|
|||||||
|
|
||||||
**Use Microsoft Intune to configure scanning options**
|
**Use Microsoft Intune to configure scanning options**
|
||||||
|
|
||||||
|
See [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/en-us/intune/device-restrictions-configure) and [Windows Defender Antivirus device restriction settings for Windows 10 in Intune](https://docs.microsoft.com/en-us/intune/device-restrictions-windows-10#windows-defender-antivirus) for more details.
|
||||||
|
|
||||||
|
|
||||||
See [Help secure Windows PCs with Endpoint Protection for Microsoft Intune: Scan options](https://docs.microsoft.com/en-us/intune/deploy-use/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune#specify-scan-options-settings) and [Windows Defender policy settings in Windows 10](https://docs.microsoft.com/en-us/intune/deploy-use/windows-10-policy-settings-in-microsoft-intune#windows-defender-1) for more details.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<a id="ref1"></a>
|
<a id="ref1"></a>
|
||||||
### Email scanning limitations
|
### Email scanning limitations
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 04/30/2018
|
ms.date: 07/10/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure and validate exclusions based on file extension and folder location
|
# Configure and validate exclusions based on file extension and folder location
|
||||||
@ -186,8 +186,7 @@ See [How to create and deploy antimalware policies: Exclusion settings](https://
|
|||||||
|
|
||||||
**Use Microsoft Intune to configure file name, folder, or file extension exclusions:**
|
**Use Microsoft Intune to configure file name, folder, or file extension exclusions:**
|
||||||
|
|
||||||
|
See [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/en-us/intune/device-restrictions-configure) and [Windows Defender Antivirus device restriction settings for Windows 10 in Intune](https://docs.microsoft.com/en-us/intune/device-restrictions-windows-10#windows-defender-antivirus) for more details.
|
||||||
See [Help secure Windows PCs with Endpoint Protection for Microsoft Intune](https://docs.microsoft.com/en-us/intune/deploy-use/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune) and [Windows Defender policy settings in Windows 10](https://docs.microsoft.com/en-us/intune/deploy-use/windows-10-policy-settings-in-microsoft-intune#windows-defender-1) for more details.
|
|
||||||
|
|
||||||
|
|
||||||
**Use the Windows Defender Security Center app to configure file name, folder, or file extension exclusions:**
|
**Use the Windows Defender Security Center app to configure file name, folder, or file extension exclusions:**
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 04/30/2018
|
ms.date: 07/10/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure exclusions for files opened by processes
|
# Configure exclusions for files opened by processes
|
||||||
@ -142,8 +142,7 @@ See [How to create and deploy antimalware policies: Exclusion settings](https://
|
|||||||
|
|
||||||
**Use Microsoft Intune to exclude files that have been opened by specified processes from scans:**
|
**Use Microsoft Intune to exclude files that have been opened by specified processes from scans:**
|
||||||
|
|
||||||
|
See [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/en-us/intune/device-restrictions-configure) and [Windows Defender Antivirus device restriction settings for Windows 10 in Intune](https://docs.microsoft.com/en-us/intune/device-restrictions-windows-10#windows-defender-antivirus) for more details.
|
||||||
See [Help secure Windows PCs with Endpoint Protection for Microsoft Intune](https://docs.microsoft.com/en-us/intune/deploy-use/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune) and [Windows Defender policy settings in Windows 10](https://docs.microsoft.com/en-us/intune/deploy-use/windows-10-policy-settings-in-microsoft-intune#windows-defender-1) for more details.
|
|
||||||
|
|
||||||
|
|
||||||
**Use the Windows Defender Security Center app to exclude files that have been opened by specified processes from scans:**
|
**Use the Windows Defender Security Center app to exclude files that have been opened by specified processes from scans:**
|
||||||
@ -173,7 +172,7 @@ Environment variables | The defined variable will be populated as a path when th
|
|||||||
<a id="review"></a>
|
<a id="review"></a>
|
||||||
## Review the list of exclusions
|
## Review the list of exclusions
|
||||||
|
|
||||||
You can retrieve the items in the exclusion list with PowerShell, [System Center Configuration Manager](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings), [Intune](https://docs.microsoft.com/en-us/intune/deploy-use/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune), or the [Windows Defender Security Center app](windows-defender-security-center-antivirus.md#exclusions).
|
You can retrieve the items in the exclusion list with PowerShell, [System Center Configuration Manager](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings), [Intune](https://docs.microsoft.com/en-us/intune/device-restrictions-configure), or the [Windows Defender Security Center app](windows-defender-security-center-antivirus.md#exclusions).
|
||||||
|
|
||||||
If you use PowerShell, you can retrieve the list in two ways:
|
If you use PowerShell, you can retrieve the list in two ways:
|
||||||
|
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 04/30/2018
|
ms.date: 07/10/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@ -35,7 +35,7 @@ ms.date: 04/30/2018
|
|||||||
|
|
||||||
When Windows Defender Antivirus runs a scan, it will attempt to remediate or remove threats that it finds. You can configure how Windows Defender AV should react to certain threats, whether it should create a restore point before remediating, and when it should remove remediated threats.
|
When Windows Defender Antivirus runs a scan, it will attempt to remediate or remove threats that it finds. You can configure how Windows Defender AV should react to certain threats, whether it should create a restore point before remediating, and when it should remove remediated threats.
|
||||||
|
|
||||||
This topic describes how to configure these settings with Group Policy, but you can also use [System Center Configuration Manager](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#threat-overrides-settings) and [Microsoft Intune](https://docs.microsoft.com/en-us/intune/deploy-use/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune#choose-default-actions-settings).
|
This topic describes how to configure these settings with Group Policy, but you can also use [System Center Configuration Manager](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#threat-overrides-settings) and [Microsoft Intune](https://docs.microsoft.com/en-us/intune/device-restrictions-configure).
|
||||||
|
|
||||||
You can also use the [`Set-MpPreference` PowerShell cmdlet](https://technet.microsoft.com/itpro/powershell/windows/defender/set-mppreference) or [`MSFT_MpPreference` WMI class](https://msdn.microsoft.com/en-us/library/dn439477(v=vs.85).aspx) to configure these settings.
|
You can also use the [`Set-MpPreference` PowerShell cmdlet](https://technet.microsoft.com/itpro/powershell/windows/defender/set-mppreference) or [`MSFT_MpPreference` WMI class](https://msdn.microsoft.com/en-us/library/dn439477(v=vs.85).aspx) to configure these settings.
|
||||||
|
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 11/20/2017
|
ms.date: 07/10/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Detect and block Potentially Unwanted Applications
|
# Detect and block Potentially Unwanted Applications
|
||||||
@ -107,8 +107,7 @@ See [Use PowerShell cmdlets to configure and run Windows Defender Antivirus](use
|
|||||||
|
|
||||||
**Use Intune to configure the PUA protection feature**
|
**Use Intune to configure the PUA protection feature**
|
||||||
|
|
||||||
See [Help secure Windows PCs with Endpoint Protection for Microsoft Intune](https://docs.microsoft.com/en-us/intune/deploy-use/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune) and [Windows Defender policy settings in Windows 10](https://docs.microsoft.com/en-us/intune/deploy-use/windows-10-policy-settings-in-microsoft-intune#windows-defender-1) for more details.
|
See [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/en-us/intune/device-restrictions-configure) and [Windows Defender Antivirus device restriction settings for Windows 10 in Intune](https://docs.microsoft.com/en-us/intune/device-restrictions-windows-10#windows-defender-antivirus) for more details.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 04/30/2018
|
ms.date: 07/10/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Enable cloud-delivered protection in Windows Defender AV
|
# Enable cloud-delivered protection in Windows Defender AV
|
||||||
@ -108,25 +108,22 @@ See the following for more information and allowed parameters:
|
|||||||
|
|
||||||
**Use Intune to enable cloud-delivered protection**
|
**Use Intune to enable cloud-delivered protection**
|
||||||
|
|
||||||
1. Open the [Microsoft Intune administration console](https://manage.microsoft.com/), and navigate to the associated policy you want to configure.
|
1. Sign in to the [Azure portal](https://portal.azure.com).
|
||||||
2. Under the **Endpoint Protection** setting, scroll down to the **Endpoint Protection Service** section set the **Submit files automatically when further analysis is required** setting to either of the following:
|
2. Select **All services > Intune**.
|
||||||
1. **Send samples automatically**
|
3. In the **Intune** pane, select **Device configuration > Profiles**, and then select the **Device restrictions** profile type you want to configure. If you haven't yet created a **Device restrictions** profile type, or if you want to create a new one, see [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/en-us/intune/device-restrictions-configure).
|
||||||
1. **Send all samples automatically**
|
4. Select **Properties**, select **Settings: Configure**, and then select **Windows Defender Antivirus**.
|
||||||
|
5. On the **Cloud-delivered protection** switch, select **Enable**.
|
||||||
|
6. In the **Prompt users before sample submission** dropdown, select **Send all data without prompting**.
|
||||||
|
7. In the **Submit samples consent** dropdown, select one of the following:
|
||||||
|
1. **Send safe samples automatically**
|
||||||
|
2. **Send all samples automatically**
|
||||||
|
|
||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
> Setting to **Always Prompt** will lower the protection state of the device. Setting to **Never send** means the [Block at First Sight](configure-block-at-first-sight-windows-defender-antivirus.md) feature will not function.
|
> Setting to **Always Prompt** will lower the protection state of the device. Setting to **Never send** means the [Block at First Sight](configure-block-at-first-sight-windows-defender-antivirus.md) feature will not function.
|
||||||
5. Scroll down to the **Microsoft Active Protection Service** section and set the following settings:
|
8. Click **OK** to exit the **Windows Defender Antivirus** settings pane, click **OK** to exit the **Device restrictions** pane, and then click **Save** to save the changes to your **Device restrictions** profile.
|
||||||
|
|
||||||
Setting | Set to
|
For more information about Intune device profiles, including how to create and configure their settings, see [What are Microsoft Intune device profiles?](https://docs.microsoft.com/en-us/intune/device-profiles)
|
||||||
--|--
|
|
||||||
Join Microsoft Active Protection Service | Yes
|
|
||||||
Membership level | Advanced
|
|
||||||
Receive dynamic definitions based on Microsoft Active Protection Service reports | Yes
|
|
||||||
|
|
||||||
3. Save and [deploy the policy as usual](https://docs.microsoft.com/en-us/intune/deploy-use/common-windows-pc-management-tasks-with-the-microsoft-intune-computer-client).
|
|
||||||
|
|
||||||
See [Help secure Windows PCs with Endpoint Protection for Microsoft Intune](https://docs.microsoft.com/en-us/intune/deploy-use/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune) for more details.
|
|
||||||
|
|
||||||
**Enable cloud-delivered protection on individual clients with the Windows Defender Security Center app**
|
**Enable cloud-delivered protection on individual clients with the Windows Defender Security Center app**
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If the **Configure local setting override for reporting Microsoft MAPS** Group Policy setting is set to **Disabled**, then the **Cloud-based protection** setting in Windows Settings will be greyed-out and unavailable. Changes made through a Group Policy Object must first be deployed to individual endpoints before the setting will be updated in Windows Settings.
|
> If the **Configure local setting override for reporting Microsoft MAPS** Group Policy setting is set to **Disabled**, then the **Cloud-based protection** setting in Windows Settings will be greyed-out and unavailable. Changes made through a Group Policy Object must first be deployed to individual endpoints before the setting will be updated in Windows Settings.
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 04/30/2018
|
ms.date: 07/10/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Report on Windows Defender Antivirus protection
|
# Report on Windows Defender Antivirus protection
|
||||||
@ -28,7 +28,7 @@ There are a number of ways you can review protection status and alerts, dependin
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
You can use System Center Configuration Manager to [monitor Windows Defender AV protection](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/monitor-endpoint-protection) or [create email alerts](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-configure-alerts), or you can also monitor protection using the [Microsoft Intune console](https://docs.microsoft.com/en-us/intune/deploy-use/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune#monitor-endpoint-protection).
|
You can use System Center Configuration Manager to [monitor Windows Defender AV protection](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/monitor-endpoint-protection) or [create email alerts](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-configure-alerts), or you can also monitor protection using [Microsoft Intune](https://docs.microsoft.com/en-us/intune/introduction-intune).
|
||||||
|
|
||||||
Microsoft Operations Management Suite has an [Update Compliance add-in](/windows/deployment/update/update-compliance-get-started) that reports on key Windows Defender AV issues, including protection updates and real-time protection settings.
|
Microsoft Operations Management Suite has an [Update Compliance add-in](/windows/deployment/update/update-compliance-get-started) that reports on key Windows Defender AV issues, including protection updates and real-time protection settings.
|
||||||
|
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 08/26/2017
|
ms.date: 07/10/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Review Windows Defender AV scan results
|
# Review Windows Defender AV scan results
|
||||||
@ -83,7 +83,9 @@ Use the [**Get** method of the **MSFT_MpThreat** and **MSFT_MpThreatDetection**]
|
|||||||
|
|
||||||
**Use Microsoft Intune to review Windows Defender AV scan results:**
|
**Use Microsoft Intune to review Windows Defender AV scan results:**
|
||||||
|
|
||||||
See [Help secure Windows PCs with Endpoint Protection for Microsoft Intune: Monitor Endpoint Protection](https://docs.microsoft.com/en-us/intune/deploy-use/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune#monitor-endpoint-protection).
|
1. In Intune, go to **Devices > All Devices** and select the device you want to scan.
|
||||||
|
|
||||||
|
2. Click the scan results in **Device actions status**.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 08/26/2017
|
ms.date: 07/10/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@ -98,8 +98,9 @@ See the following for more information and allowed parameters:
|
|||||||
|
|
||||||
**Use Microsoft Intune to run a scan:**
|
**Use Microsoft Intune to run a scan:**
|
||||||
|
|
||||||
|
1. In Intune, go to **Devices > All Devices** and select the device you want to scan.
|
||||||
|
|
||||||
See [Help secure Windows PCs with Endpoint Protection for Microsoft Intune: Run a malware scan](https://docs.microsoft.com/en-us/intune/deploy-use/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune#run-a-malware-scan-or-update-malware-definitions-on-a-computer) and [Windows Defender policy settings in Windows 10](https://docs.microsoft.com/en-us/intune/deploy-use/windows-10-policy-settings-in-microsoft-intune#windows-defender-1) for more details.
|
2. Select **...More** and then select **Quick Scan** or **Full Scan**.
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 04/30/2018
|
ms.date: 07/10/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@ -43,7 +43,7 @@ In addition to always-on real-time protection and [on-demand](run-scan-windows-d
|
|||||||
|
|
||||||
You can configure the type of scan, when the scan should occur, and if the scan should occur after a [protection update](manage-protection-updates-windows-defender-antivirus.md) or if the endpoint is being used. You can also specify when special scans to complete remediation should occur.
|
You can configure the type of scan, when the scan should occur, and if the scan should occur after a [protection update](manage-protection-updates-windows-defender-antivirus.md) or if the endpoint is being used. You can also specify when special scans to complete remediation should occur.
|
||||||
|
|
||||||
This topic describes how to configure scheduled scans with Group Policy, PowerShell cmdlets, and WMI. You can also configure schedules scans with [System Center Configuration Manager](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#scheduled-scans-settings) or [Microsoft Intune](https://docs.microsoft.com/en-us/intune/deploy-use/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intunespecify-scan-schedule-settings).
|
This topic describes how to configure scheduled scans with Group Policy, PowerShell cmdlets, and WMI. You can also configure schedules scans with [System Center Configuration Manager](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#scheduled-scans-settings) or [Microsoft Intune](https://docs.microsoft.com/en-us/intune/device-restrictions-configure).
|
||||||
|
|
||||||
To configure the Group Policy settings described in this topic:
|
To configure the Group Policy settings described in this topic:
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user