From 7525874d25d4b99fdc677d50c4730d95b84508bd Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Thu, 28 Jul 2016 17:27:59 +1000 Subject: [PATCH 1/2] PUA topic for RS1 --- ...ble-pua-windows-defender-for-windows-10.md | 43 +++++++++++++++++++ 1 file changed, 43 insertions(+) create mode 100644 windows/keep-secure/enable-pua-windows-defender-for-windows-10.md diff --git a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md new file mode 100644 index 0000000000..0d4ed08ca1 --- /dev/null +++ b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md @@ -0,0 +1,43 @@ +--- +title: Use PowerShell cmdlets to configure and run Windows Defender in Windows 10 +description: In Windows 10, you can use PowerShell cmdlets to run scans, update definitions, and change settings in Windows Defender. +keywords: scan, command line, mpcmdrun, defender +search.product: eADQiWindows 10XVcnh +ms.pagetype: security +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +author: dulcemv +--- + +# Use PowerShell cmdlets to configure and run Windows Defender + +**Applies to:** + +- Windows 10 + +You can use PowerShell to perform various functions in Windows Defender. Similar to the command prompt or command line, PowerShell is a task-based command-line shell and scripting language designed especially for system administration, and you can read more about it at the [PowerShell hub on MSDN](https://msdn.microsoft.com/en-us/powershell/mt173057.aspx). + +For a list of the cmdlets and their functions and available parameters, see the [Defender cmdlets](https://technet.microsoft.com/en-us/library/dn433280.aspx) topic. + +PowerShell cmdlets are most useful in Windows Server environments that don't rely on a graphical user interface (GUI) to configure software. + +> **Note:**  PowerShell cmdlets should not be used as a replacement for a full network policy management infrastructure, such as [System Center Configuration Manager](https://technet.microsoft.com/en-us/library/gg682129.aspx), [Group Policy Management Console](https://technet.microsoft.com/en-us/library/cc731212.aspx), or [Windows Defender Group Policy ADMX templates](https://support.microsoft.com/en-us/kb/927367). + +PowerShell is typically installed under the folder _%SystemRoot%\system32\WindowsPowerShell_. + + +**Use Windows Defender PowerShell cmdlets** + +1. Click **Start**, type **powershell**, and press **Enter**. +2. Click **Windows PowerShell** to open the interface. + > **Note:**  You may need to open an administrator-level version of PowerShell. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt. +3. Enter the command and parameters. + +To open online help for any of the cmdlets type the following: + +```text +Get-Help -Online +``` +Omit the `-online` parameter to get locally cached help. From 0df48c6c2f7f6a242a93e163288c9fc87cd5b80d Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Mon, 1 Aug 2016 15:47:10 +1000 Subject: [PATCH 2/2] Updated PUA RS1 contents --- ...ble-pua-windows-defender-for-windows-10.md | 98 +++++++++++++++---- 1 file changed, 79 insertions(+), 19 deletions(-) diff --git a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md index 0d4ed08ca1..ce0c2e93e0 100644 --- a/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md +++ b/windows/keep-secure/enable-pua-windows-defender-for-windows-10.md @@ -1,43 +1,103 @@ --- -title: Use PowerShell cmdlets to configure and run Windows Defender in Windows 10 -description: In Windows 10, you can use PowerShell cmdlets to run scans, update definitions, and change settings in Windows Defender. -keywords: scan, command line, mpcmdrun, defender +title: Detect and block Potentially Unwanted Application with Windows Defender +description: In Windows 10, you can enable the Potentially Unwanted Application (PUA) feature in Managed Windows Defender to identify and block unwanted software during download and install time. +keywords: pua, enable, detect pua, block pua, windows defender and pua search.product: eADQiWindows 10XVcnh ms.pagetype: security ms.prod: w10 -ms.mktglfcycl: manage +ms.mktglfcycl: detect ms.sitesec: library ms.pagetype: security author: dulcemv --- -# Use PowerShell cmdlets to configure and run Windows Defender +# Detect and block Potentially Unwanted Application in Windows 10 **Applies to:** - Windows 10 -You can use PowerShell to perform various functions in Windows Defender. Similar to the command prompt or command line, PowerShell is a task-based command-line shell and scripting language designed especially for system administration, and you can read more about it at the [PowerShell hub on MSDN](https://msdn.microsoft.com/en-us/powershell/mt173057.aspx). +You can enable the Potentially Unwanted Application (PUA) feature in Managed Windows Defender to identify and block unwanted software during download and install time. -For a list of the cmdlets and their functions and available parameters, see the [Defender cmdlets](https://technet.microsoft.com/en-us/library/dn433280.aspx) topic. +Potentially Unwanted Application (PUA) refers to applications that are not considered viruses, malware, or other types of threats, but might perform actions on your computer that adversely affect your computing experience. It also refers to applications considered to have a poor reputation. -PowerShell cmdlets are most useful in Windows Server environments that don't rely on a graphical user interface (GUI) to configure software. +Typical examples of PUA behavior include: +* Various types of software bundling +* Ad-injection into your browsers +* Driver and registry optimizers that detect issues, request payment to fix them, and persist -> **Note:**  PowerShell cmdlets should not be used as a replacement for a full network policy management infrastructure, such as [System Center Configuration Manager](https://technet.microsoft.com/en-us/library/gg682129.aspx), [Group Policy Management Console](https://technet.microsoft.com/en-us/library/cc731212.aspx), or [Windows Defender Group Policy ADMX templates](https://support.microsoft.com/en-us/kb/927367). +These applications can increase the risk of your network being infected with malware, cause malware infections to be harder to identify among the noise, and can waste helpdesk, IT, and user time in cleaning up the applications. -PowerShell is typically installed under the folder _%SystemRoot%\system32\WindowsPowerShell_. +Since the stakes are higher in an enterprise environment, the potential disaster and potential productivity and performance disruptions that PUA brings can be a cause of concern. Hence, it is important to deliver trusted protection in this field. +**Enable PUA protection in SCCM and Intune** -**Use Windows Defender PowerShell cmdlets** +The PUA feature is available for enterprise users who are running System Center Configuration Manager (SCCM) or Intune in their infrastructure. -1. Click **Start**, type **powershell**, and press **Enter**. -2. Click **Windows PowerShell** to open the interface. +***Configure PUA in SCCM*** + +For SCCM users, PUA is enabled by default. See the following topics for configuration details: + +If you are using these versions | See these topics +:---|:--- +System Center Configuration Manager (current branch) version 1606 | [Create a new antimalware policy](https://technet.microsoft.com/en-US/library/mt613199.aspx#To-create-a-new-antimalware-policy)
[Real-time Protection Settings](https://technet.microsoft.com/en-US/library/mt613199.aspx#Real-time-Protection-Settings) +System Center 2012 R2 Endpoint Protection
System Center 2012 Configuration Manager
System Center 2012 Configuration Manager SP1
System Center 2012 Configuration Manager SP2
System Center 2012 R2 Configuration Manager
System Center 2012 Endpoint Protection SP1
System Center 2012 Endpoint Protection
System Center 2012 R2 Configuration Manager SP1| [How to Deploy Potentially Unwanted Application Protection Policy for Endpoint Protection in Configuration Manager](https://technet.microsoft.com/library/hh508770.aspx#BKMK_PUA) + +***Use PUA audit mode in SCCM*** + +You can use PowerShell to detect PUA without blocking them. In fact, you can run audit mode on individual machines. This feature is useful if your company is conducting an internal software security compliance check and you’d like to avoid any false positives. + +1. Open PowerShell as Administrator
+ + a. Click **Start**, type **powershell**, and press **Enter**. + + b. Click **Windows PowerShell** to open the interface. > **Note:**  You may need to open an administrator-level version of PowerShell. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt. -3. Enter the command and parameters. +2. Enter the PowerShell command: -To open online help for any of the cmdlets type the following: + ```text + et-mpPreference -puaprotection 2 + ``` +> [!NOTE] +> PUA events are reported in the Windows Event Viewer and not in SCCM. -```text -Get-Help -Online -``` -Omit the `-online` parameter to get locally cached help. + +***Configure PUA in Intune*** + + PUA is not enabled by default. You need to [Create and deploy a PUA configuration policy to use it](https://docs.microsoft.com/en-us/intune/deploy-use/manage-settings-and-features-on-your-devices-with-microsoft-intune-policies). See the [Potentially Unwanted Application Detection policy setting](https://docs.microsoft.com/en-us/intune/deploy-use/windows-10-policy-settings-in-microsoft-intune) for details. + + + ***Use PUA audit mode in Intune*** + + You can detect PUA without blocking them from your client. Gain insights into what can be blocked. + +**View PUA events** + +PUA events are reported in the Windows Event Viewer and not in SCCM or Intune. To view PUA events: + +1. Open **Event Viewer**. +2. In the console tree, expand **Applications and Services Logs**, then **Microsoft**, then **Windows**, then **Windows Defender**. +3. Double-click on **Operational**. +4. In the details pane, view the list of individual events to find your event. PUA events are under Event ID 1160 along with detection details. + +You can find a complete list of the Microsoft antimalware event IDs, the symbol, and the description of each ID in [Windows Server Antimalware Events TechNet](https://technet.microsoft.com/library/dn913615.aspx). + + +**What PUA notifications look like** + +When a detection occurs, end users who enabled the PUA detection feature will see the following notification: + + +To see historical PUA detections that occurred on a PC, users can go to History, then **Quarantined items** or **All detected items**. + +**PUA threat file-naming convention** + +When enabled, potentially unwanted applications are identified with threat names that start with “PUA:”, such as, PUA:Win32/Creprote. + +**PUA blocking conditions** + +PUA protection quarantines the file so they won’t run. PUA will be blocked only at download or install-time. A file will be included for blocking if it has been identified as PUA and meets one of the following conditions: +* The file is being scanned from the browser +* The file has [Mark of the Web](https://msdn.microsoft.com/en-us/library/ms537628%28v=vs.85%29.aspx) set +* The file is in the %downloads% folder +* Or if the file in the %temp% folder