GPO to turn on Reputation Based Protection Windows 10

Anonymous
2020-11-03T14:25:08.757+00:00

Does anyone know which GPO setting is the one to turn this on? I've installed the May 2020 Administrative Templates but cant find it. ![37166-image.png][1] [1]: /api/attachments/37166-image.png?platform=QnA

Windows
Windows
A family of Microsoft operating systems that run across personal computers, tablets, laptops, phones, internet of things devices, self-contained mixed reality headsets, large collaboration screens, and other devices.
4,724 questions
{count} votes

Accepted answer
  1. Anonymous
    2020-11-30T17:03:56.317+00:00

    Ok so I tried adding the Edge admin templates and it made no difference. I decided to spend (waste) my time finding this and after much trial and error, I found that it is in fact this: Computer > Policy > Admin > Windows Components > Windows Defender Smartscreen > Explorer > Configure Windows defender Smartscreen Turning this on, enables this setting. I will note that I had to install May and October 2020 admin templates in. May 2020 https://www.microsoft.com/en-us/download/101445 October 2020 https://www.microsoft.com/en-us/download/details.aspx?id=102157 You may have to restart the PC for this to apply - GPUPDATE /FORCE does not apply it ![43716-screenshot-2020-11-30-170204.jpg][1] [1]: /api/attachments/43716-screenshot-2020-11-30-170204.jpg?platform=QnA


8 additional answers

Sort by: Most helpful
  1. BenFloydyWork 21 Reputation points
    2020-11-30T15:09:19.177+00:00

    I've found the answer to this after much confused searching.

    The old GPO setting (even with the 20H2 Windows 10 admx templates incidentally) no longer appears to work (whether this is 20H2 or Edge Chromium I haven't had time or inclination to determine, but I think it matters little).

    Instead you need the msedge.admx templates from Microsoft (https://www.microsoft.com/en-us/edge/business/download) - I used version 87 Stable, and this did the job (choose Get Policy Files once the version is selected).

    Once these are applied to your AD, you have policies directly under Admin Templates>Microsoft Edge, and under here is one called SmartScreen Settings, with the policies you need to control this once more.

    43687-image.png

    4 people found this answer helpful.

  2. Fan Fan 15,291 Reputation points Microsoft Vendor
    2020-11-04T01:22:37.56+00:00

    Hi,
    To Use Group Policy to configure PUA protection:

    On your Group Policy management computer, open the Group Policy Management Console, right-click the Group Policy Object you want to configure, and select Edit.

    In the Group Policy Management Editor, go to Computer configuration and select Administrative templates.

    Expand the tree to Windows components > Microsoft Defender Antivirus.

    Double-click Configure protection for potentially unwanted applications.

    Select Enabled to enable PUA protection.

    In Options, select Block to block potentially unwanted applications, or select Audit Mode to test how the setting will work in your environment. Select OK.

    Other ways to do this, you can refer to this article.

    Best Regards,


  3. Anonymous
    2020-11-06T10:30:33.587+00:00

    Yes. I dont think this setting is for this ![37910-image.png][1] [1]: /api/attachments/37910-image.png?platform=QnA

    0 comments No comments

  4. Fan Fan 15,291 Reputation points Microsoft Vendor
    2020-11-09T08:04:03.773+00:00

    Hi,
    This is the GPO setting for Potentially Unwanted App (PUA) (Reputation Based Protection).
    You can check that by :
    Click Reputation Based Protection settings under the turn on box ,
    38240-11093.jpg
    Check on box for Potentially Unwanted App blocking as following:
    38274-11092.jpg
    Then you will see the turn on box will disappear as following :
    38297-11095.jpg

    If you click the turn on box under Reputation Based Protection, the box will be checked .

    So if you enable the Potentially Unwanted App (PUA) by GPO, it will be the same result.

    If the GPO is not applied ,please run command :gpresult /h report.html and check the result.
    Also, if you configured the policy on the local group policy , make sure that the settings are not configured by your domain policy.