Evaluate Microsoft Defender Antivirus using Group Policy
Applies to:
- Microsoft Defender Antivirus
- Microsoft Defender for Endpoint Plan 1
- Microsoft Defender for Endpoint Plan 2
Platforms:
- Windows
In Windows 10 or newer and Windows Server 2016 or newer, you can use next-generation protection features offered by Microsoft Defender Antivirus (MDAV) and Microsoft Defender Exploit Guard (Microsoft Defender EG).
This topic explains how to enable and test the key protection features in Microsoft Defender AV and Microsoft Defender EG and provides you with guidance and links to more information.
This article describes configuration options in Windows 10 or newer and Windows Server 2016 or newer.
Use Microsoft Defender Antivirus using Group Policy to enable the features
This guide provides the Microsoft Defender Antivirus Group Policy that configures the features you should use to evaluate our protection.
Grab the latest 'Windows Group Policy Administrative Templates'.
For more information, see Create and manage Central Store - Windows Client.
Tip
The Windows one works with the Windows Servers.
Even if you are running a Windows 10 or Windows Server 2016, get the latest administrative templates for Windows 11 or newer.
Create a 'Central Store' to host the latest .admx and .adml templates.
For more information, see Create and manage Central Store - Windows Client.
If joined to a domain:
Create a new OU block policy inheritance.
Open Group policy Management Console (GPMC.msc).
Go to Group Policy Objects and create a new Group Policy.
Right-click the new policy created and select Edit.
Navigate to Computer Configuration > Policies > Administrative Templates > Windows Components > Microsoft Defender Antivirus.
or
If joined to a workgroup
Open Group Policy Editor MMC (GPEdit.msc).
Navigate to Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus.
MDAV and Potentially Unwanted Applications (PUA)
Root:
Description | Setting |
---|---|
Turn off Microsoft Defender Antivirus | Disabled |
Configure detection for potentially unwanted applications | Enabled - Block |
Real-time protection (always-on protection, real-time scanning)
\Real-time protection:
Description | Setting |
---|---|
Turn off real-time protection | Disabled |
Configure monitoring for incoming and outgoing file and program activity | Enabled, bi-directional (full on-access) |
Turn on Behavior Monitoring | Enabled |
Monitor file and program activity on your computer | Enabled |
Cloud protection features
Standard security intelligence updates can take hours to prepare and deliver; our cloud-delivered protection service can deliver this protection in seconds.
For more information, see Use next-gen technologies in Microsoft Defender Antivirus through cloud-delivered protection.
\MAPS:
Description | Setting |
---|---|
Join Microsoft MAPS | Enabled, Advanced MAPS |
Configure the 'Block at First Sight' feature | Enabled |
Send file samples when further analysis is required | Enabled, Send all samples |
\MpEngine:
Description | Setting |
---|---|
Select cloud protection level | Enabled, High blocking level |
Configure extended cloud check | Enabled, 50 |
Scans
Description | Setting |
---|---|
Turn on Heuristics | Enabled |
Turn on e-mail scanning | Enabled |
Scan all downloaded files and attachments | Enabled |
Turn on script scanning | Enabled |
Scan archive files | Enabled |
Scan packed executables | Enabled |
Configure scanning of network files (Scan Network Files) | Enabled |
Scan removable drives | Enabled |
Turn on reparse point scanning | Enabled |
Security Intelligence updates
Description | Setting |
---|---|
Specify the interval to check for security intelligence updates | Enabled, 4 |
Define the order of sources for downloading security intelligence updates | Enabled, under 'Define the order of sources for downloading security intelligence updates' InternalDefinitionUpdateServer | MicrosoftUpdateServer | MMPC Note: Where InternalDefinitionUpdateServer is WSUS with Microsoft Defender Antivirus updates allowed. MicrosoftUpdateServer == Microsoft Update (formerly Windows Update). MMPC == https://www.microsoft.com/en-us/wdsi/definitions |
Disable local administrator AV settings
Disable local administrator AV settings such as exclusions, and enforce the policies from the Microsoft Defender for Endpoint Security Settings Management.
Root:
Description | Setting |
---|---|
Configure local administrator merge behavior for lists | Disabled |
Control whether or not exclusions are visible to local admins | Enabled |
Threat Severity Default Action
\Threats
Description | Setting | Alert level | Action |
---|---|---|---|
Specify threat alert levels at which default action shouldn't be taken when detected | Enabled | ||
5 (Severe) | 2 (Quarantine) | ||
4 (High) | 2 (Quarantine) | ||
2 (Medium) | 2 (Quarantine) | ||
1 (Low) | 2 (Quarantine) |
\Quarantine
Description | Setting |
---|---|
Configure removal of items from Quarantine folder | Enabled, 60 |
\Client Interface
Description | Setting |
---|---|
Enable headless UI mode | Disabled |
Network Protection
\Microsoft Defender Exploit Guard\Network Protection:
Description | Setting |
---|---|
Prevent users and apps from accessing dangerous websites | Enabled, Block |
This settings controls whether Network Protection is allowed to be configured into block or audit mode on Windows Server | Enabled |
To enable Network Protection for Windows Servers, for now, please use Powershell:
OS | Powershell cmdlet |
---|---|
Windows Server 2012 R2Windows Server 2022 and later | set-MpPreference -AllowNetworkProtectionOnWinServer $true |
Windows Server 2016 and Windows Server 2012 R2 unified MDE client | set-MpPreference -AllowNetworkProtectionOnWinServer $true and set-MpPreference -AllowNetworkProtectionDownLevel $true |
Attack Surface Reduction Rules
Navigate to Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Attack Surface Reduction.
Select Next.
Description | Setting |
---|---|
be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 Note: (Block executable content from email client and webmail) |
1 (Block) |
7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c Note: (Block Adobe Reader from creating child processes) |
1 (Block) |
5beb7efe-fd9a-4556-801d-275e5ffc04cc Note: (Block execution of potentially obfuscated scripts) |
1 (Block) |
56a863a9-875e-4185-98a7-b882c64b5ce5 Note: (Block abuse of exploited vulnerable signed drivers) |
1 (Block) |
92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b Note: (Block Win32 API calls from Office macros) |
1 (Block) |
01443614-cd74-433a-b99e-2ecdc07bfc25 Note: (Block executable files from running unless they meet a prevalence, age, or trusted list criterion) |
1 (Block) |
26190899-1602-49e8-8b27-eb1d0a1ce869 Note: (Block Office communication application from creating child processes) |
1 (Block) |
d4f940ab-401b-4efc-aadc-ad5f3c50688a Note: (Block all Office applications from creating child processes) |
1 (Block) |
c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb Note: ( [PREVIEW] Block use of copied or impersonated system tools) |
1 (Block) |
d3e037e1-3eb8-44c8-a917-57927947596d Note: (Block JavaScript or VBScript from launching downloaded executable content) |
1 (Block) |
9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2 Note: (Block credential stealing from the Windows local security authority subsystem) |
1 (Block) |
a8f5898e-1dc8-49a9-9878-85004b8a61e6 Note: (Block Web shell creation for Servers) |
1 (Block) |
3b576869-a4ec-4529-8536-b80a7769e899 Note: (Block Office applications from creating executable content) |
1 (Block) |
b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 Note: (Block untrusted and unsigned processes that run from USB) |
1 (Block) |
75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84 Note: (Block Office applications from injecting code into other processes) |
1 (Block) |
e6db77e5-3df2-4cf1-b95a-636979351e5b Note: (Block persistence through WMI event subscription) |
1 (Block) |
c1db55ab-c21a-4637-bb3f-a12568109d35 Note: (Use advanced protection against ransomware) |
1 (Block) |
d1e49aac-8f56-4280-b9ba-993a6d77406c Note: (Block process creations originating from PSExec and WMI commands) |
1 (Block) Note: If you have Configuration Manager (formerly SCCM), or other management tools that use WMI, you might need to set this to 2 ('audit') instead of 1('block'). |
33ddedf1-c6e0-47cb-833e-de6133960387 Note: ( [PREVIEW] Block rebooting machine in Safe Mode) |
1 (Block) |
Tip
Some rules may block behavior you find acceptable in your organization. In these cases, change the rule from 'Enabled' to 'Audit' to prevent unwanted blocks.
Controlled Folder Access
Navigate to Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Attack Surface Reduction.
Description | Setting |
---|---|
Configure Controlled Folder Access | Enabled, Block |
Assign the policies to the OU where the test machines are located.
Check the Platform Update version
The latest 'Platform Update' version Production channel (GA) is available here:
To check which 'Platform Update' version you have installed, use the following PowerShell command (Run as admin):
get-mpComputerStatus | ft AMProductVersion
Check the Security Intelligence Update version
The latest 'Security Intelligence Update' version is available here:
To check which 'Security Intelligence Update' version you have installed, use the following PowerShell command (Run as admin):
get-mpComputerStatus | ft AntivirusSignatureVersion
Check the Engine Update version
The latest scan 'engine update' version is available here:
To check which 'Engine Update' version you have installed, use the following PowerShell command(Run as admin):
get-mpComputerStatus | ft AMEngineVersion
If you're finding that your settings aren't taking effect, you might have a conflict. To resolve conflicts, refer: Troubleshoot Microsoft Defender Antivirus settings.
For False Negatives (FNs) submissions
If you have any questions about a detection that Microsoft Defender AV makes, or you discover a missed detection, you can submit a file to us.
If you have Microsoft XDR, Microsoft Defender for Endpoint P2/P1, or Microsoft Defender for Business: refer Submit files in Microsoft Defender for Endpoint.
If you have Microsoft Defender Antivirus, refer: https://www.microsoft.com/security/portal/mmpc/help/submission-help.aspx
Microsoft Defender AV indicates a detection through standard Windows notifications. You can also review detections in the Microsoft Defender AV app.
The Windows event log also records detection and engine events. See the Microsoft Defender Antivirus events article for a list of event IDs and their corresponding actions.
If your settings aren't applied properly, find out if there are conflicting policies that are enabled in your environment. For more information, see Troubleshoot Microsoft Defender Antivirus settings.
If you need to open a Microsoft support case: Contact Microsoft Defender for Endpoint support.