36 KiB
Raw Blame History

title, description, ms.assetid, ms.reviewer, manager, ms.author, ms.topic, ms.prod, ms.technology, author, ms.localizationpriority, ms.date
title description ms.assetid ms.reviewer manager ms.author ms.topic ms.prod ms.technology author ms.localizationpriority ms.date
Defender CSP Learn how the Windows Defender configuration service provider is used to configure various Windows Defender actions across the enterprise. 481AA74F-08B2-4A32-B95D-5A3FD05B335C dansimp dansimp article w10 windows dansimp medium 02/22/2022

Defender CSP

Edition Windows 10 Windows 11
Home Yes Yes
Pro Yes Yes
Business Yes Yes
Enterprise Yes Yes
Education Yes Yes

Warning

Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.

The Windows Defender configuration service provider is used to configure various Windows Defender actions across the enterprise.

The following example shows the Windows Defender configuration service provider in tree format.

./Vendor/MSFT
Defender
----Detections
--------ThreatId
------------Name
------------URL
------------Severity
------------Category
------------CurrentStatus
------------ExecutionStatus
------------InitialDetectionTime
------------LastThreatStatusChangeTime
------------NumberOfDetections
----EnableNetworkProtection
--------AllowNetworkProtectionDownLevel
--------AllowNetworkProtectionOnWinServer
--------DisableNetworkProtectionPerfTelemetry
--------DisableDatagramProcessing
--------DisableInboundConnectionFiltering
--------EnableDnsSinkhole
--------DisableDnsOverTcpParsing
--------DisableHttpParsing
--------DisableRdpParsing
--------DisableSshParsing
--------DisableTlsParsing
----Health
--------ProductStatus (Added in Windows 10 version 1809)
--------ComputerState
--------DefenderEnabled
--------RtpEnabled
--------NisEnabled
--------QuickScanOverdue
--------FullScanOverdue
--------SignatureOutOfDate
--------RebootRequired
--------FullScanRequired
--------EngineVersion
--------SignatureVersion
--------DefenderVersion
--------QuickScanTime
--------FullScanTime
--------QuickScanSigVersion
--------FullScanSigVersion
--------TamperProtectionEnabled (Added in Windows 10, version 1903)
--------IsVirtualMachine (Added in Windows 10, version 1903)
----Configuration (Added in Windows 10, version 1903)
--------TamperProtection (Added in Windows 10, version 1903)
--------EnableFileHashComputation (Added in Windows 10, version 1903)
--------SupportLogLocation (Added in the next major release of Windows 10)
--------PlatformUpdatesChannel (Added with the 4.18.2106.5 Defender platform release)
--------EngineUpdatesChannel (Added with the 4.18.2106.5 Defender platform release)
--------SecurityIntelligenceUpdatesChannel (Added with the 4.18.2106.5 Defender platform release)
--------DisableGradualRelease (Added with the 4.18.2106.5 Defender platform release)
--------PassiveRemediation (Added with the 4.18.2202.X Defender platform release)
----Scan
----UpdateSignature
----OfflineScan (Added in Windows 10 version 1803)

Detections
An interior node to group all threats detected by Windows Defender.

Supported operation is Get.

Detections/ThreatId
The ID of a threat that has been detected by Windows Defender.

Supported operation is Get.

Detections/ThreatId/Name
The name of the specific threat.

The data type is a string.

Supported operation is Get.

Detections/ThreatId/URL
URL link for more threat information.

The data type is a string.

Supported operation is Get.

Detections/ThreatId/Severity
Threat severity ID.

The data type is integer.

The following list shows the supported values:

  • 0 = Unknown
  • 1 = Low
  • 2 = Moderate
  • 4 = High
  • 5 = Severe

Supported operation is Get.

Detections/ThreatId/Category
Threat category ID.

The data type is integer.

The following table describes the supported values:

Value Description
0 Invalid
1 Adware
2 Spyware
3 Password stealer
4 Trojan downloader
5 Worm
6 Backdoor
7 Remote access Trojan
8 Trojan
9 Email flooder
10 Key logger
11 Dialer
12 Monitoring software
13 Browser modifier
14 Cookie
15 Browser plugin
16 AOL exploit
17 Nuker
18 Security disabler
19 Joke program
20 Hostile ActiveX control
21 Software bundler
22 Stealth modifier
23 Settings modifier
24 Toolbar
25 Remote control software
26 Trojan FTP
27 Potential unwanted software
28 ICQ exploit
29 Trojan telnet
30 Exploit
31 File sharing program
32 Malware creation tool
33 Remote control software
34 Tool
36 Trojan denial of service
37 Trojan dropper
38 Trojan mass mailer
39 Trojan monitoring software
40 Trojan proxy server
42 Virus
43 Known
44 Unknown
45 SPP
46 Behavior
47 Vulnerability
48 Policy
49 EUS (Enterprise Unwanted Software)
50 Ransomware
51 ASR Rule

Supported operation is Get.

Detections/ThreatId/CurrentStatus
Information about the current status of the threat.

The data type is integer.

The following list shows the supported values:

  • 0 = Active
  • 1 = Action failed
  • 2 = Manual steps required
  • 3 = Full scan required
  • 4 = Reboot required
  • 5 = Remediated with noncritical failures
  • 6 = Quarantined
  • 7 = Removed
  • 8 = Cleaned
  • 9 = Allowed
  • 10 = No Status (Cleared)

Supported operation is Get.

Detections/ThreatId/CurrentStatus
Information about the current status of the threat.

The data type is integer.

The following list shows the supported values:

  • 0 = Active
  • 1 = Action failed
  • 2 = Manual steps required
  • 3 = Full scan required
  • 4 = Reboot required
  • 5 = Remediated with noncritical failures
  • 6 = Quarantined
  • 7 = Removed
  • 8 = Cleaned
  • 9 = Allowed
  • 10 = No Status (Cleared)

Supported operation is Get.

Detections/ThreatId/ExecutionStatus
Information about the execution status of the threat.

The data type is integer.

The following list shows the supported values:

  • 0 = Unknown
  • 1 = Blocked
  • 2 = Allowed
  • 3 = Running
  • 4 = Not running

Supported operation is Get.

Detections/ThreatId/InitialDetectionTime
The first time this particular threat was detected.

The data type is a string.

Supported operation is Get.

Detections/ThreatId/LastThreatStatusChangeTime
The last time this particular threat was changed.

The data type is a string.

Supported operation is Get.

Detections/ThreatId/NumberOfDetections
Number of times this threat has been detected on a particular client.

The data type is integer.

Supported operation is Get.

EnableNetworkProtection

The Network Protection Service is a network filter that helps to protect you against web-based malicious threats, including phishing and malware. The Network Protection service contacts the SmartScreen URL reputation service to validate the safety of connections to web resources. The acceptable values for this parameter are:

  • 0: Disabled. The Network Protection service won't block navigation to malicious websites, or contact the SmartScreen URL reputation service. It will still send connection metadata to the antimalware engine if behavior monitoring is enabled, to enhance AV Detections.
  • 1: Enabled. The Network Protection service will block connections to malicious websites based on URL Reputation from the SmartScreen URL reputation service.
  • 2: AuditMode. As above, but the Network Protection service won't block connections to malicious websites, but will instead log the access to the event log.

Accepted values: Disabled, Enabled, and AuditMode Position: Named Default value: Disabled Accept pipeline input: False Accept wildcard characters: False

EnableNetworkProtection/AllowNetworkProtectionDownLevel

By default, network protection isn't allowed to be enabled on Windows versions before 1709, regardless of the setting of the EnableNetworkProtection configuration. Set this configuration to "$true" to override that behavior and allow Network Protection to be set to Enabled or Audit Mode.

  • Type: Boolean
  • Position: Named
  • Default value: False
  • Accept pipeline input: False
  • Accept wildcard characters: False

EnableNetworkProtection/AllowNetworkProtectionOnWinServer

By default, network protection isn't allowed to be enabled on Windows Server, regardless of the setting of the EnableNetworkProtection configuration. Set this configuration to "$true" to override that behavior and allow Network Protection to be set to Enabled or Audit Mode.

  • Type: Boolean
  • Position: Named
  • Default value: False
  • Accept pipeline input: False
  • Accept wildcard characters: False

EnableNetworkProtection/DisableNetworkProtectionPerfTelemetry

Network Protection sends up anonymized performance statistics about its connection monitoring to improve our product and help to find bugs. You can disable this behavior by setting this configuration to "$true".

  • Type: Boolean
  • Position: Named
  • Default value: False
  • Accept pipeline input: False
  • Accept wildcard characters: False

EnableNetworkProtection/DisableDatagramProcessing

Network Protection inspects UDP connections allowing us to find malicious DNS or other UDP Traffic. To disable this functionality, set this configuration to "$true".

  • Type: Boolean
  • Position: Named
  • Default value: False
  • Accept pipeline input: False
  • Accept wildcard characters: False

EnableNetworkProtection/DisableInboundConnectionFiltering

Network Protection inspects and can block both connections that originate from the host machine, and those connections that originate from outside the machine. To have network connection to inspect only outbound connections, set this configuration to "$true".

  • Type: Boolean
  • Position: Named
  • Default value: False
  • Accept pipeline input: False
  • Accept wildcard characters: False

EnableNetworkProtection/EnableDnsSinkhole

Network Protection can inspect the DNS traffic of a machine and, in conjunction with behavior monitoring, detect and sink hole DNS exfiltration attempts and other DNS-based malicious attacks. Set this configuration to "$true" to enable this feature.

  • Type: Boolean
  • Position: Named
  • Default value: False
  • Accept pipeline input: False
  • Accept wildcard characters: False

EnableNetworkProtection/DisableDnsOverTcpParsing

Network Protection inspects DNS traffic that occurs over a TCP channel, to provide metadata for Anti-malware Behavior Monitoring or to allow for DNS sink holing if the -EnableDnsSinkhole configuration is set. This attribute can be disabled by setting this value to "$true".

  • Type: Boolean
  • Position: Named
  • Default value: False
  • Accept pipeline input: False
  • Accept wildcard characters: False

EnableNetworkProtection/DisableDnsParsing

Network Protection inspects DNS traffic that occurs over a UDP channel, to provide metadata for Anti-malware Behavior Monitoring or to allow for DNS sink holing if the -EnableDnsSinkhole configuration is set. This attribute can be disabled by setting this value to "$true".

  • Type: Boolean
  • Position: Named
  • Default value: False
  • Accept pipeline input: False
  • Accept wildcard characters: False

EnableNetworkProtection/DisableHttpParsing

Network Protection inspects HTTP traffic to see if a connection is being made to a malicious website, and to provide metadata to Behavior Monitoring. HTTP connections to malicious websites can also be blocked if -EnableNetworkProtection is set to enabled. HTTP inspection can be disabled by setting this value to "$true".

  • Type: Boolean
  • Position: Named
  • Default value: False
  • Accept pipeline input: False
  • Accept wildcard characters: False

EnableNetworkProtection/DisableRdpParsing

Network Protection inspects RDP traffic so that it can block connections from known malicious hosts if -EnableNetworkProtection is set to be enabled, and to provide metadata to behavior monitoring. RDP inspection can be disabled by setting this value to "$true".

  • Type: Boolean
  • Position: Named
  • Default value: False
  • Accept pipeline input: False
  • Accept wildcard characters: False

EnableNetworkProtection/DisableSshParsing

Network Protection inspects SSH traffic, so that it can block connections from known malicious hosts. If -EnableNetworkProtection is set to be enabled, and to provide metadata to behavior monitoring. SSH inspection can be disabled by setting this value to "$true".

  • Type: Boolean
  • Position: Named
  • Default value: False
  • Accept pipeline input: False
  • Accept wildcard characters: False

EnableNetworkProtection/DisableTlsParsing

Network Protection inspects TLS traffic (also known as HTTPS traffic) to see if a connection is being made to a malicious website, and to provide metadata to Behavior Monitoring. TLS connections to malicious websites can also be blocked if -EnableNetworkProtection is set to enabled. HTTP inspection can be disabled by setting this value to "$true".

  • Type: Boolean
  • Position: Named
  • Default value: False
  • Accept pipeline input: False
  • Accept wildcard characters: False

Health
An interior node to group information about Windows Defender health status.

Supported operation is Get.

Health/ProductStatus
Added in Windows 10, version 1809. Provide the current state of the product. This value is a bitmask flag value that can represent one or multiple product states from below list.

The data type is integer. Supported operation is Get.

Supported product status values:

  • No status = 0
  • Service not running = 1 << 0
  • Service started without any malware protection engine = 1 << 1
  • Pending full scan due to threat action = 1 << 2
  • Pending reboot due to threat action = 1 << 3
  • ending manual steps due to threat action = 1 << 4
  • AV signatures out of date = 1 << 5
  • AS signatures out of date = 1 << 6
  • No quick scan has happened for a specified period = 1 << 7
  • No full scan has happened for a specified period = 1 << 8
  • System initiated scan in progress = 1 << 9
  • System initiated clean in progress = 1 << 10
  • There are samples pending submission = 1 << 11
  • Product running in evaluation mode = 1 << 12
  • Product running in non-genuine Windows mode = 1 << 13
  • Product expired = 1 << 14
  • Off-line scan required = 1 << 15
  • Service is shutting down as part of system shutdown = 1 << 16
  • Threat remediation failed critically = 1 << 17
  • Threat remediation failed non-critically = 1 << 18
  • No status flags set (well-initialized state) = 1 << 19
  • Platform is out of date = 1 << 20
  • Platform update is in progress = 1 << 21
  • Platform is about to be outdated = 1 << 22
  • Signature or platform end of life is past or is impending = 1 << 23
  • Windows SMode signatures still in use on non-Win10S install = 1 << 24

Example:

<SyncML xmlns="SYNCML:SYNCML1.1">
  <SyncBody>
    <Get>
      <CmdID>1</CmdID>
        <Item>
          <Target>
            <LocURI>./Vendor/MSFT/Defender/Health/ProductStatus</LocURI>
          </Target>
        </Item>
    </Get>
    <Final/>
  </SyncBody>
</SyncML>

Health/ComputerState
Provide the current state of the device.

The data type is integer.

The following list shows the supported values:

  • 0 = Clean
  • 1 = Pending full scan
  • 2 = Pending reboot
  • 4 = Pending manual steps (Windows Defender is waiting for the user to take some action, such as restarting the computer or running a full scan)
  • 8 = Pending offline scan
  • 16 = Pending critical failure (Windows Defender has failed critically and an Administrator needs to investigate and take some action, such as restarting the computer or reinstalling Windows Defender)

Supported operation is Get.

Health/DefenderEnabled
Indicates whether the Windows Defender service is running.

The data type is a Boolean.

Supported operation is Get.

Health/RtpEnabled
Indicates whether real-time protection is running.

The data type is a Boolean.

Supported operation is Get.

Health/NisEnabled
Indicates whether network protection is running.

The data type is a Boolean.

Supported operation is Get.

Health/QuickScanOverdue
Indicates whether a Windows Defender quick scan is overdue for the device.

A Quick scan is overdue when a scheduled Quick scan didn't complete successfully for 2 weeks and catchup Quick scans are disabled (default).

The data type is a Boolean.

Supported operation is Get.

Health/FullScanOverdue
Indicates whether a Windows Defender full scan is overdue for the device.

A Full scan is overdue when a scheduled Full scan didn't complete successfully for 2 weeks and catchup Full scans are disabled (default).

The data type is a Boolean.

Supported operation is Get.

Health/SignatureOutOfDate
Indicates whether the Windows Defender signature is outdated.

The data type is a Boolean.

Supported operation is Get.

Health/RebootRequired
Indicates whether a device reboot is needed.

The data type is a Boolean.

Supported operation is Get.

Health/FullScanRequired
Indicates whether a Windows Defender full scan is required.

The data type is a Boolean.

Supported operation is Get.

Health/EngineVersion
Version number of the current Windows Defender engine on the device.

The data type is a string.

Supported operation is Get.

Health/SignatureVersion
Version number of the current Windows Defender signatures on the device.

The data type is a string.

Supported operation is Get.

Health/DefenderVersion
Version number of Windows Defender on the device.

The data type is a string.

Supported operation is Get.

Health/QuickScanTime
Time of the last Windows Defender quick scan of the device.

The data type is a string.

Supported operation is Get.

Health/FullScanTime
Time of the last Windows Defender full scan of the device.

The data type is a string.

Supported operation is Get.

Health/QuickScanSigVersion
Signature version used for the last quick scan of the device.

The data type is a string.

Supported operation is Get.

Health/FullScanSigVersion
Signature version used for the last full scan of the device.

The data type is a string.

Supported operation is Get.

Health/TamperProtectionEnabled
Indicates whether the Windows Defender tamper protection feature is enabled.

The data type is a Boolean.

Supported operation is Get.

Health/IsVirtualMachine
Indicates whether the device is a virtual machine.

The data type is a string.

Supported operation is Get.

Configuration
An interior node to group Windows Defender configuration information.

Supported operation is Get.

Configuration/TamperProtection

Tamper protection helps protect important security features from unwanted changes and interference. This protection includes real-time protection, behavior monitoring, and more. Accepts signed string to turn the feature on or off. Settings are configured with an MDM solution, such as Intune and is available in Windows 10 Enterprise E5 or equivalent subscriptions.

Send off blob to device to reset the tamper protection state before setting this configuration to "not configured" or "unassigned" in Intune.

The data type is a Signed BLOB.

Supported operations are Add, Delete, Get, Replace.

Intune tamper protection setting UX supports three states:

  • Not configured (default): Doesn't have any impact on the default state of the device.
  • Enabled: Enables the tamper protection feature.
  • Disabled: Turns off the tamper protection feature.

When enabled or disabled exists on the client and admin moves the setting to not configured, it won't have any impact on the device state. To change the state to either enabled or disabled would require to be set explicitly.

Configuration/DisableLocalAdminMerge
This policy setting controls whether or not complex list settings configured by a local administrator are merged with managed settings. This setting applies to lists such as threats and exclusion list.

If you disable or don't configure this setting, unique items defined in preference settings configured by the local administrator will be merged into the resulting effective policy. If conflicts occur, management settings will override preference settings.

If you enable this setting, only items defined by management will be used in the resulting effective policy. Managed settings will override preference settings configured by the local administrator.

Note

Applying this setting won't remove exclusions from the device registry, it will only prevent them from being applied/used. This is reflected in Get-MpPreference.

Supported OS versions: Windows 10

The data type is integer.

Supported operations are Add, Delete, Get, Replace.

Valid values are:

  • 1 Enable.
  • 0 (default) Disable.

Configuration/HideExclusionsFromLocalAdmins

This policy setting controls whether or not exclusions are visible to Local Admins. For end users (that aren't Local Admins) exclusions aren't visible, whether or not this setting is enabled.

If you disable or don't configure this setting, Local Admins will be able to see exclusions in the Windows Security App, in the registry, and via PowerShell.

If you enable this setting, Local Admins will no longer be able to see the exclusion list in the Windows Security app, in the registry, or via PowerShell.

Note

Applying this setting won't remove exclusions, it will only prevent them from being visible to Local Admins. This is reflected in Get-MpPreference.

Supported OS versions: Windows 10

The data type is integer.

Supported operations are Add, Delete, Get, and Replace.

Valid values are:

  • 1 Enable.
  • 0 (default) Disable.

Configuration/DisableCpuThrottleOnIdleScans

Indicates whether the CPU will be throttled for scheduled scans while the device is idle. This feature is enabled by default and won't throttle the CPU for scheduled scans performed when the device is otherwise idle, regardless of what ScanAvgCPULoadFactor is set to. For all other scheduled scans, this flag will have no impact and normal throttling will occur.

The data type is integer.

Supported operations are Add, Delete, Get, and Replace.

Valid values are:

  • 1 (default) Enable.
  • 0 Disable.

Configuration/MeteredConnectionUpdates
Allow managed devices to update through metered connections. Data charges may apply.

The data type is integer.

Supported operations are Add, Delete, Get, and Replace.

Valid values are:

  • 1 Enable.
  • 0 (default) Disable.

Configuration/AllowNetworkProtectionOnWinServer
This settings controls whether Network Protection is allowed to be configured into block or audit mode on Windows Server. If false, the value of EnableNetworkProtection will be ignored.

The data type is integer.

Supported operations are Add, Delete, Get, and Replace.

Valid values are:

  • 1 Enable.
  • 0 (default) Disable.

Configuration/ExclusionIpAddress
Allows an administrator to explicitly disable network packet inspection made by wdnisdrv on a particular set of IP addresses.

The data type is string.

Supported operations are Add, Delete, Get, and Replace.

Configuration/EnableFileHashComputation
Enables or disables file hash computation feature. When this feature is enabled, Windows Defender will compute hashes for files it scans.

The data type is integer.

Supported operations are Add, Delete, Get, and Replace.

Valid values are:

  • 1 Enable.
  • 0 (default) Disable.

Configuration/SupportLogLocation
The support log location setting allows the administrator to specify where the Microsoft Defender Antivirus diagnostic data collection tool (MpCmdRun.exe) will save the resulting log files. This setting is configured with an MDM solution, such as Intune, and is available for Windows 10 Enterprise.

Data type is string.

Supported operations are Add, Delete, Get, and Replace.

Intune Support log location setting UX supports three states:

  • Not configured (default) - Doesn't have any impact on the default state of the device.
  • 1 - Enabled. Enables the Support log location feature. Requires admin to set custom file path.
  • 0 - Disabled. Turns off the Support log location feature.

When enabled or disabled exists on the client and admin moves the setting to be configured not , it won't have any impact on the device state. To change the state to either enabled or disabled would require to be set explicitly.

More details:

Configuration/PlatformUpdatesChannel Enable this policy to specify when devices receive Microsoft Defender platform updates during the monthly gradual rollout.

Beta Channel: Devices set to this channel will be the first to receive new updates. Select Beta Channel to participate in identifying and reporting issues to Microsoft. Devices in the Windows Insider Program are subscribed to this channel by default. For use in (manual) test environments only and a limited number of devices.

Current Channel (Preview): Devices set to this channel will be offered updates earliest during the monthly gradual release cycle. Suggested for pre-production/validation environments.

Current Channel (Staged): Devices will be offered updates after the monthly gradual release cycle. Suggested applying to a small, representative part of your production population (~10%).

Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).

Critical: Devices will be offered updates with a 48-hour delay. Suggested for critical environments only

If you disable or don't configure this policy, the device will stay up to date automatically during the gradual release cycle. Suitable for most devices.

The data type is integer.

Supported operations are Add, Delete, Get, and Replace.

Valid values are:

  • 0: Not configured (Default)
  • 2: Beta Channel - Prerelease
  • 3: Current Channel (Preview)
  • 4: Current Channel (Staged)
  • 5: Current Channel (Broad)
  • 6: Critical- Time Delay

More details:

Configuration/EngineUpdatesChannel Enable this policy to specify when devices receive Microsoft Defender engine updates during the monthly gradual rollout.

Beta Channel: Devices set to this channel will be the first to receive new updates. Select Beta Channel to participate in identifying and reporting issues to Microsoft. Devices in the Windows Insider Program are subscribed to this channel by default. For use in (manual) test environments only and a limited number of devices.

Current Channel (Preview): Devices set to this channel will be offered updates earliest during the monthly gradual release cycle. Suggested for pre-production/validation environments.

Current Channel (Staged): Devices will be offered updates after the monthly gradual release cycle. Suggested applying to a small, representative part of your production population (~10%).

Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).

Critical: Devices will be offered updates with a 48-hour delay. Suggested for critical environments only

If you disable or don't configure this policy, the device will stay up to date automatically during the gradual release cycle. Suitable for most devices.

The data type is integer.

Supported operations are Add, Delete, Get, and Replace.

Valid values are:

  • 0: Not configured (Default)
  • 2: Beta Channel - Prerelease
  • 3: Current Channel (Preview)
  • 4: Current Channel (Staged)
  • 5: Current Channel (Broad)
  • 6: Critical- Time Delay

More details:

Configuration/SecurityIntelligenceUpdatesChannel Enable this policy to specify when devices receive daily Microsoft Defender security intelligence (definition) updates during the daily gradual rollout.

Current Channel (Staged): Devices will be offered updates after the release cycle. Suggested to apply to a small, representative part of production population (~10%).

Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).

If you disable or don't configure this policy, the device will stay up to date automatically during the daily release cycle. Suitable for most devices.

The data type is integer. Supported operations are Add, Delete, Get, and Replace.

Valid Values are:

  • 0: Not configured (Default)
  • 4: Current Channel (Staged)
  • 5: Current Channel (Broad)

More details:

Configuration/DisableGradualRelease Enable this policy to disable gradual rollout of monthly and daily Microsoft Defender updates. Devices will be offered all Microsoft Defender updates after the gradual release cycle completes. This facility for devices is best for datacenters that only receive limited updates.

Note

This setting applies to both monthly as well as daily Microsoft Defender updates and will override any previously configured channel selections for platform and engine updates.

If you disable or don't configure this policy, the device will remain in Current Channel (Default) unless specified otherwise in specific channels for platform and engine updates. Stay up to date automatically during the gradual release cycle. Suitable for most devices.

The data type is integer.

Supported operations are Add, Delete, Get, and Replace.

Valid values are:

  • 1 Enabled.
  • 0 (default) Not Configured.

More details:

Configuration/PassiveRemediation This policy setting enables or disables EDR in block mode (recommended for devices running Microsoft Defender Antivirus in passive mode). For more information, see Endpoint detection and response in block mode | Microsoft Docs. Available with platform release: 4.18.2202.X

The data type is integer

Supported values:

  • 1: Turn EDR in block mode on
  • 0: Turn EDR in block mode off

Scan
Node that can be used to start a Windows Defender scan on a device.

Valid values are:

  • 1 - quick scan
  • 2 - full scan

Supported operations are Get and Execute.

UpdateSignature
Node that can be used to perform signature updates for Windows Defender.

Supported operations are Get and Execute.

OfflineScan
Added in Windows 10, version 1803. OfflineScan action starts a Microsoft Defender Offline scan on the computer where you run the command. After the next OS reboot, the device will start in Microsoft Defender Offline mode to begin the scan.

Supported operations are Get and Execute.

See also

Configuration service provider reference