Skip to content

Commit

Permalink
Merge pull request #1782 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
pushing MDAV doc updates live
  • Loading branch information
denisebmsft authored Nov 1, 2024
2 parents 3d75163 + d007989 commit 98ecaeb
Show file tree
Hide file tree
Showing 7 changed files with 113 additions and 160 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ ms.custom: nextgen
ms.reviewer: pahuijbr
manager: deniseb
ms.subservice: ngp
ms.date: 07/10/2024
ms.date: 11/01/2024
ms.collection:
- m365-security
- tier2
Expand Down Expand Up @@ -39,10 +39,7 @@ For details on configuring Microsoft Configuration Manager (current branch), see
## Use Group Policy to configure scanning options

> [!TIP]
> Download the Group Policy Reference Spreadsheet, which lists the policy settings for computer and user configurations that are included in the Administrative template files delivered with for Windows. You can configure refer to the spreadsheet when you edit Group Policy Objects.
>
> Here are the most recent versions:
>
> Download the Group Policy Reference Spreadsheet, which lists the policy settings for computer and user configurations that are included in the Administrative template files delivered with for Windows. You can configure refer to the spreadsheet when you edit Group Policy Objects. Here are the most recent versions:
> - [Group Policy Settings Reference Spreadsheet for Windows 10 May 2020 Update (2004)](https://www.microsoft.com/download/details.aspx?id=101451)
> - [Group Policy Settings Reference Spreadsheet for Windows 11 October 2021 Update (21H2)](https://www.microsoft.com/download/details.aspx?id=103506)
Expand All @@ -68,7 +65,7 @@ For details on configuring Microsoft Configuration Manager (current branch), see
|Scan mapped network drives<br/>**Scan** \> **Run full scan on mapped network drives**|Disabled|`-DisableScanningMappedNetworkDrivesForFullScan`|
|Scan archive files (such as .zip or .rar files). <br/>**Scan** \> **Scan archive files**|Enabled|`-DisableArchiveScanning` <br/><br/>The [extensions exclusion list](configure-extension-file-exclusions-microsoft-defender-antivirus.md) will take precedence over this setting.|
|Scan files on the network <br/>**Scan** \> **Scan network files**|Disabled|`-DisableScanningNetworkFiles`|
|Scan packed executables<br/>**Scan** \> **Scan packed executables**|Enabled|Not available <br/><br/>Scan packed executables were removed from the following templates:<br/>- Administrative Templates (.admx) for Windows 11 2022 Update (22H2)<br/>- Administrative Templates (.admx) for Windows 11 October 2021 Update (21H2)|
|Scan packed executables<br/>**Scan** \> **Scan packed executables**|Enabled|Not available <br/><br/>Scan packed executables were removed from the following templates:<br/>- Administrative Templates (.admx) for Windows 11 2023 Update (23H2)<br/>- Administrative Templates (.admx) for Windows 11 2022 Update (22H2) - v3.0 <br/>- Administrative Templates (.admx) for Windows 11 2022 Update (22H2)<br/>- Administrative Templates (.admx) for Windows 11 October 2021 Update (21H2)|
|Scan removable drives during full scans only<br/>**Scan** \> **Scan removable drives**|Disabled|`-DisableRemovableDriveScanning`|
|Specify the level of subfolders within an archive folder to scan <p>**Scan** \> **Specify the maximum depth to scan archive files**|0|Not available|
|Specify the maximum CPU load (as a percentage) during a scan. <p> **Scan** \> **Specify the maximum percentage of CPU utilization during a scan**|50|`-ScanAvgCPULoadFactor`<br/><br/> The maximum CPU load is not a hard limit, but is guidance for the scanning engine to not exceed the maximum on average. Manual scans ignore this setting and run without any CPU limits.|
Expand All @@ -93,11 +90,11 @@ See [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/wi

Email scanning enables scanning of email files used by Outlook and other mail clients during on-demand and scheduled scans. Embedded objects within email (such as attachments and archived files) are also scanned. The following file format types can be scanned and remediated:

- DBX
- MBX
- MIME
- `DBX`
- `MBX`
- `MIME`

PST files used by Outlook 2003 or older (where the archive type is set to non-unicode) are also scanned, but Microsoft Defender Antivirus cannot remediate threats that are detected inside PST files.
`PST` files used by Outlook 2003 or older (where the archive type is set to non-unicode) are also scanned, but Microsoft Defender Antivirus cannot remediate threats that are detected inside `PST` files.

If Microsoft Defender Antivirus detects a threat inside an email message, the following information is displayed to assist you in identifying the compromised email so you can remediate the threat manually:

Expand Down
9 changes: 3 additions & 6 deletions defender-endpoint/machine-tags.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ author: denisebmsft
ms.localizationpriority: medium
manager: deniseb
audience: ITPro
ms.collection:
ms.collection:
- m365-security
- tier2
ms.topic: reference
Expand All @@ -32,7 +32,7 @@ ms.date: 02/27/2023
Add tags on devices to create a logical group affiliation. Device tags support proper mapping of the network, enabling you to attach different tags to capture context and to enable dynamic list creation as part of an incident. Tags can be used as a filter in the **Device inventory** view, or to group devices. For more information on device grouping, see [Create and manage device groups](machine-groups.md).

> [!NOTE]
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
You can add tags on devices using the following ways:

Expand Down Expand Up @@ -62,7 +62,6 @@ To add device tags using API, see [Add or remove device tags API](api/add-or-rem
2. Select **Manage tags** from the row of Response actions.

:::image type="content" source="media/manage-tags-option.png" alt-text="Image of manage tags button" lightbox="media/manage-tags-option.png":::


3. Type to find or create tags

Expand All @@ -81,7 +80,7 @@ You can also delete tags from this view.

## Add device tags using dynamic rules for device tagging

You can create and manage rules that automatically assign and remove tags from devices based on user-defined criteria directly in the Microsoft Defender portal. Please refer to following documents for details
You can create and manage rules that automatically assign and remove tags from devices based on user-defined criteria directly in the Microsoft Defender portal. Please refer to following documents for details:

- [Manage your devices with ease using dynamic rules for device tagging in Microsoft Defender](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/manage-your-devices-with-ease-using-dynamic-rules-for-device/ba-p/4024988)
- [Asset rule management - Dynamic rules for devices](/defender-xdr/configure-asset-rules)
Expand Down Expand Up @@ -157,8 +156,6 @@ You can use Microsoft Intune to define and apply device tags. You can perform th

- In the [OMA-IRU settings](/mem/intune/configuration/custom-settings-windows-10) section, for **Data type**, choose **String**. For **OMA-URI**, type (or paste) `./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/DeviceTagging/Group`.



## Add device tags by creating app configuration policy in Microsoft Intune

> [!NOTE]
Expand Down
Loading

0 comments on commit 98ecaeb

Please sign in to comment.