Enable and configure Microsoft Defender Antivirus always-on protection - Microsoft Defender for Endpoint (2024)

  • Article

Applies to:

  • Microsoft Defender for Endpoint Plan 1
  • Microsoft Defender for Endpoint Plan 2
  • Microsoft Defender Antivirus

Platforms

  • Windows

Always-on protection consists of real-time protection, behavior monitoring, and heuristics to identify malware based on known suspicious and malicious activities. These activities include events, such as processes making unusual changes to existing files, modifying or creating automatic startup registry keys and startup locations (also known as autostart extensibility points, or ASEPs), and other changes to the file system or file structure. Always-on protection is an important part of your antivirus protection and should be enabled.

Note

Tamper protection helps keep always-on protection and other security settings from being changed. As a result, when tamper protection is enabled, any changes made to tamper-protected settings are ignored. If you must make changes to a device and those changes are blocked by tamper protection, we recommend using troubleshooting mode to temporarily disable tamper protection on the device. Note that after troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.

Manage antivirus settings with Microsoft Intune

You can use Intune to configure antivirus policies, and then apply those policies across devices in your organization. Antivirus policies help security admins focus on managing the discrete group of antivirus settings for managed devices. Each antivirus policy includes several profiles. Each profile contains only the settings that are relevant for Microsoft Defender Antivirus for macOS and Windows devices, or for the user experience in the Windows Security app on Windows devices. For more information, see Antivirus policy for endpoint security in Intune.

  1. Go to the Intune admin center and sign in.

  2. In the navigation pane, choose Endpoint security and then, under Manage, choose Antivirus.

  3. Select an existing policy, or choose + Create Policy to create a new policy.

    TaskWhat to do
    Create a new policy for Windows devices1. In the Create a profile step, in the Platform list, select Windows 10, Windows 11, and Windows Server. For Profile, select Microsoft Defender Antivirus. Then choose Create.

    2. On the Basics step, type a name and description for your policy, and then choose Next.

    3. On the Configuration settings step, expand Defender, select the settings you want to use for your policy, and then choose Next. To get help with your settings, refer to Policy CSP - Defender.

    4. On the Scope tags step, choose Select scope tags to open the Select tags pane to assign scope tags to the profile, and then select Next to continue.

    5. On the Assignments page, select the groups to receive this profile, and then select Next. For more information on assigning profiles, see Assign user and device profiles.

    6. On the Review + create page, when you're done, choose Create. The new profile is displayed in the list when you select the policy type for the profile you created.

    Create a new policy for macOS devices1. In the Create a profile step, in the Platform list, select macOS. For Profile, select Antivirus. Then choose Create.

    2. On the Basics step, type a name and description for your policy, and then choose Next.

    3. On the Configuration settings step, select the settings you want to use for your policy, and then choose Next. To get help with your settings, refer to Set preferences for Microsoft Defender for Endpoint on macOS.

    4. On the Scope tags step, choose Select scope tags to open the Select tags pane to assign scope tags to the profile, and then select Next to continue.

    5. On the Assignments page, select the groups to receive this profile, and then select Next. For more information on assigning profiles, see Assign user and device profiles.

    6. On the Review + create page, when you're done, choose Create. The new profile is displayed in the list when you select the policy type for the profile you created.

    Edit an existing policy for Windows devices1. Select an antivirus policy for Windows devices.

    2. Next to Configuration settings, choose Edit.

    3. Expand Defender, and then edit settings for your policy. To get help with your settings, refer to Policy CSP - Defender.

    4. select Review + save, and then select Save.

    Edit an existing policy for macOS devices1. Select an antivirus policy for macOS devices.

    2. Select Properties, and then, next to Configuration settings, choose Edit.

    3. Under Microsoft Defender for Endpoint, edit settings for your policy. To get help with your settings, refer to Set preferences for Microsoft Defender for Endpoint on macOS.

    4. select Review + save, and then select Save.

Are you using Group Policy?

Important

We recommend using Microsoft Intune to manage Microsoft Defender Antivirus settings for your organization. With Intune, you can control where tamper protection is enabled (or disabled) through policies. You can also protect Microsoft Defender Antivirus exclusions. For more information, see Protect Microsoft Defender Antivirus exclusions from tampering.

You can use Group Policy to manage some Microsoft Defender Antivirus settings. If tamper protection is enabled in your organization, any changes made to tamper-protected settings are ignored. You can't turn off tamper protection by using Group Policy.

If you must make changes to a device and those changes are blocked by tamper protection, we recommend using troubleshooting mode to temporarily disable tamper protection on the device. After troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.

You can use Local Group Policy Editor to enable and configure Microsoft Defender Antivirus always-on protection settings.

Enable and configure always-on protection using Group Policy

  1. Open Local Group Policy Editor, as follows:

    1. In your Windows 10 or Windows 11 taskbar search box, type gpedit.

    2. Under Best match, select Edit group policy to launch Local Group Policy Editor.

  2. In the left pane of Local Group Policy Editor, expand the tree to Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus.

  3. Configure the Microsoft Defender Antivirus antimalware service policy setting.

    In the Microsoft Defender Antivirus details pane on right, double-click Allow antimalware service to start up with normal priority, and set it to Enabled.

    Then select OK.

  4. Configure the Microsoft Defender Antivirus real-time protection policy settings, as follows:

    1. In the Microsoft Defender Antivirus details pane, double-click Real-time Protection. Or, from the Microsoft Defender Antivirus tree on left pane, select Real-time Protection.

    2. In the Real-time Protection details pane on right, double-click the policy setting as specified in Real-time protection policy settings (later in this article).

    3. Configure the setting as appropriate, and select OK.

    4. Repeat the previous steps for each setting in the table.

  5. Configure the Microsoft Defender Antivirus scanning policy setting, as follows:

    1. From the Microsoft Defender Antivirus tree on left pane, select Scan.

    2. In the Scan details pane on right, double-click Turn on heuristics, and set it to Enabled.

    3. Select OK.

  6. Close Local Group Policy Editor.

Real-time protection policy settings

For the most current settings, get the latest ADMX files in your central store. See How to create and manage the Central Store for Group Policy Administrative Templates in Windows and download the latest files.

Disable real-time protection in Group Policy

Warning

Disabling real-time protection drastically reduces the protection on your endpoints and is not recommended. In addition, if tamper protection is enabled, you cannot turn it off by using Group Policy. If you must make changes to a device and those changes are blocked by tamper protection, we recommend using troubleshooting mode to temporarily disable tamper protection on the device. Note that after troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.

  1. Open Local Group Policy Editor.

    1. In your Windows 10 or Windows 11 taskbar search box, type gpedit.

    2. Under Best match, select Edit group policy to launch Local Group Policy Editor.

  2. In the left pane of Local Group Policy Editor, expand the tree to Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Real-time Protection.

  3. In the Real-time Protection details pane on right, double-click Turn off real-time protection.

  4. In the Turn off real-time protection setting window, set the option to Enabled.

  5. select OK.

  6. Close Local Group Policy Editor.

See also

  • Configure behavioral, heuristic, and real-time protection
  • Microsoft Defender Antivirus in Windows 10

If you're looking for antivirus-related information for other platforms, see:

  • Set preferences for Microsoft Defender for Endpoint on macOS
  • Microsoft Defender for Endpoint on Mac
  • macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune
  • Set preferences for Microsoft Defender for Endpoint on Linux
  • Microsoft Defender for Endpoint on Linux
  • Configure Defender for Endpoint on Android features
  • Configure Microsoft Defender for Endpoint on iOS features

Tip

Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender for Endpoint Tech Community.

Enable and configure Microsoft Defender Antivirus always-on protection - Microsoft Defender for Endpoint (2024)
Top Articles
What is Liquidity?
Risks of Trading Low-Volume Stocks — Yochaa
Napa Autocare Locator
Www.politicser.com Pepperboy News
Comforting Nectar Bee Swarm
Sportsman Warehouse Cda
Beds From Rent-A-Center
Crime Scene Photos West Memphis Three
Dark Souls 2 Soft Cap
Seth Juszkiewicz Obituary
Aita Autism
Craigslist Cars Nwi
6th gen chevy camaro forumCamaro ZL1 Z28 SS LT Camaro forums, news, blog, reviews, wallpapers, pricing – Camaro5.com
The Shoppes At Zion Directory
Restaurants Near Paramount Theater Cedar Rapids
Swedestats
Caledonia - a simple love song to Scotland
EASYfelt Plafondeiland
Winco Employee Handbook 2022
Ac-15 Gungeon
Chime Ssi Payment 2023
Turbo Tenant Renter Login
Cb2 South Coast Plaza
At 25 Years, Understanding The Longevity Of Craigslist
Panolian Batesville Ms Obituaries 2022
No Limit Telegram Channel
208000 Yen To Usd
Table To Formula Calculator
Anesthesia Simstat Answers
Weather Underground Durham
Craigslist Sf Garage Sales
Grand Teton Pellet Stove Control Board
Ixlggusd
Ixl Lausd Northwest
Amici Pizza Los Alamitos
Louisville Volleyball Team Leaks
Reborn Rich Ep 12 Eng Sub
Dr Adj Redist Cadv Prin Amex Charge
The Thing About ‘Dateline’
Silive Obituary
התחבר/י או הירשם/הירשמי כדי לראות.
Exam With A Social Studies Section Crossword
Rocket Lab hiring Integration & Test Engineer I/II in Long Beach, CA | LinkedIn
Aznchikz
Used Auto Parts in Houston 77013 | LKQ Pick Your Part
15:30 Est
Rocket Bot Royale Unblocked Games 66
Coleman Funeral Home Olive Branch Ms Obituaries
Nfsd Web Portal
Buildapc Deals
라이키 유출
Lorcin 380 10 Round Clip
Latest Posts
Article information

Author: Pres. Carey Rath

Last Updated:

Views: 5944

Rating: 4 / 5 (61 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Pres. Carey Rath

Birthday: 1997-03-06

Address: 14955 Ledner Trail, East Rodrickfort, NE 85127-8369

Phone: +18682428114917

Job: National Technology Representative

Hobby: Sand art, Drama, Web surfing, Cycling, Brazilian jiu-jitsu, Leather crafting, Creative writing

Introduction: My name is Pres. Carey Rath, I am a faithful, funny, vast, joyous, lively, brave, glamorous person who loves writing and wants to share my knowledge and understanding with you.