Skip to main content
Applies to:
You can deploy, manage, and report on Windows Defender Antivirus in a number of ways.
Because the Windows Defender Antivirus client is installed as a core part of Windows 10, traditional deployment of a client to your endpoints does not apply.
However, in most cases you will still need to enable the protection service on your endpoints with Microsoft Intune, System Center Configuration Manager, Azure Security Center, or Group Policy Objects, which is described in the following table.
You'll also see additional links for:
  • Managing Windows Defender Antivirus protection, including managing product and protection updates
  • Reporting on Windows Defender Antivirus protection
 Important
In most cases, Windows 10 will disable Windows Defender Antivirus if it finds another antivirus product that is running and up-to-date. You must disable or uninstall third-party antivirus products before Windows Defender Antivirus will function. If you re-enable or install third-party antivirus products, then Windows 10 automatically disables Windows Defender Antivirus.
ToolDeployment options (2)Management options (network-wide configuration and policy or baseline deployment) (3)Reporting options
Microsoft IntuneAdd endpoint protection settings in IntuneConfigure device restriction settings in IntuneUse the Intune console to manage devices
System Center Configuration Manager (1)Use the Endpoint Protection point site system role and enable Endpoint Protection with custom client settingsWith default and customized antimalware policiesand client managementWith the default Configuration Manager Monitoring workspace and email alerts
Group Policy and Active Directory (domain-joined)Use a Group Policy Object to deploy configuration changes and ensure Windows Defender Antivirus is enabled.Use Group Policy Objects (GPOs) to Configure update options for Windows Defender Antivirus and Configure Windows Defender featuresEndpoint reporting is not available with Group Policy. You can generate a list of Group Policies to determine if any settings or policies are not applied
PowerShellDeploy with Group Policy, System Center Configuration Manager, or manually on individual endpoints.Use the Set-MpPreference and Update-MpSignature [] cmdlets available in the Defender moduleUse the appropriate Get- cmdlets available in the Defender module
Windows Management InstrumentationDeploy with Group Policy, System Center Configuration Manager, or manually on individual endpoints.Use the Set method of the MSFT_MpPreference class and the Update method of the MSFT_MpSignature classUse the MSFT_MpComputerStatusclass and the get method of associated classes in the Windows Defender WMIv2 Provider
Microsoft AzureDeploy Microsoft Antimalware for Azure in the Azure portal, by using Visual Studio virtual machine configuration, or using Azure PowerShell cmdlets. You can also Install Endpoint protection in Azure Security CenterConfigure Microsoft Antimalware for Virtual Machines and Cloud Services with Azure PowerShell cmdletsor use code samplesUse Microsoft Antimalware for Virtual Machines and Cloud Services with Azure PowerShell cmdlets to enable monitoring. You can also review usage reports in Azure Active Directory to determine suspicious activity, including the Possibly infected devices report and configure an SIEM tool to report on Windows Defender Antivirus events and add that tool as an app in AAD.
  1. The availability of some functions and features, especially related to cloud-delivered protection, differ between System Center Configuration Manager (Current Branch) and System Center Configuration Manager 2012. In this library, we've focused on Windows 10, Windows Server 2016, and System Center Configuration Manager (Current Branch). See Use Microsoft cloud-provided protection in Windows Defender Antivirus for a table that describes the major differences. (Return to table)
  2. In Windows 10, Windows Defender Antivirus is a component available without installation or deployment of an additional client or service. It will automatically be enabled when third-party antivirus products are either uninstalled or out of date (except on Windows Server 2016). Traditional deployment therefore is not required. Deployment here refers to ensuring the Windows Defender Antivirus component is available and enabled on endpoints or servers. (Return to table)
  3. Configuration of features and protection, including configuring product and protection updates, are further described in the Configure Windows Defender Antivirus features section in this library. (Return to table)

In this section

TopicDescription
Deploy and enable Windows Defender Antivirus protectionWhile the client is installed as a core part of Windows 10, and traditional deployment does not apply, you will still need to enable the client on your endpoints with System Center Configuration Manager, Microsoft Intune, or Group Policy Objects.
Manage Windows Defender Antivirus updates and apply baselinesThere are two parts to updating Windows Defender Antivirus: updating the client on endpoints (product updates), and updating Security intelligence (protection updates). You can update Security intelligence in a number of ways, using System Center Configuration Manager, Group Policy, PowerShell, and WMI.
Monitor and report on Windows Defender Antivirus protectionYou can use Microsoft Intune, System Center Configuration Manager, the Update Compliance add-in for Microsoft Operations Management Suite, or a third-party SIEM product (by consuming Windows event logs) to monitor protection status and create reports about endpoint protection.

Comments

Popular posts from this blog

Configure Block At First Sight Windows Defender Antivirus _Enable Block Windows 10

Applies to: Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) Block at first sight is a feature of next gen protection that provides a way to detect and block new malware within seconds. It is enabled by default when certain pre-requisite settings are also enabled. In most cases, these pre-requisite settings are also enabled by default, so the feature is running without any intervention. You can  specify how long the file should be prevented from running  while the cloud-based protection service analyzes the file. You can also  customize the message displayed on users' desktops  when a file is blocked. You can change the company name, contact information, and message URL.   Tip You can also visit the Microsoft Defender ATP demo website at  demo.wd.microsoft.com  to confirm the features are working and see how they work. How it works When Windows Defender Antivirus encounters a suspicious but u...

Review event logs and error codes to troubleshoot issues with Windows Defender Antivirus Windos 10

Applies to: Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) If you encounter a problem with Windows Defender Antivirus, you can search the tables in this topic to find a matching issue and potential solution. The tables list: Windows Defender Antivirus event IDs  (these apply to both Windows 10 and Windows Server 2016) Windows Defender Antivirus client error codes Internal Windows Defender Antivirus client error codes (used by Microsoft during development and testing)  Tip You can also visit the Microsoft Defender ATP demo website at  demo.wd.microsoft.com  to confirm the following features are working: Cloud-delivered protection Fast learning (including Block at first sight) Potentially unwanted application blocking Windows Defender Antivirus event IDs Windows Defender Antivirus records event IDs in the Windows event log. You can directly view the event log, or if you have a third-party security information and...

FULL MATCH - Roman Reigns vs. The Undertaker - No Holds Barred Match: WrestleMania 33 2019