AV detection test for verifying device's onboarding and reporting services
Applies to:
Scenario requirements and setup
Windows 11, Windows 10, Windows 8.1, Windows 7 SP1
Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012, and Windows Server 2008 R2
Linux
macOS
Microsoft Defender Real-time protection is enabled
EICAR test file to simulate malware
After you enable Microsoft Defender for Endpoint or Microsoft Defender for Business or Microsoft Defender Antivirus, you can test the service and run a proof of concept to familiarize yourself with its feature and validate the advanced security capabilities effectively protect your device by generating real security alerts.
Run an AV detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
Windows
Prepare for the EICAR test file:
- Use an EICAR test file instead of real malware to avoid causing damage. Microsoft Defender Antivirus treats EICAR test files as malware.
Create the EICAR test file:
Copy the following string:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
- Paste the string into a .TXT file and save it as EICAR.txt
Linux/macOS
- Ensure that real-time protection is enabled (denoted by a result of 1 from running the following command):
mdatp health --field real_time_protection_enabled
- Open a Terminal window. Copy and execute the following command:
Linux
curl -o ~/tmp/eicar.com.txt https://secure.eicar.org/eicar.com.txt
macOS
curl -o ~/Downloads/eicar.com.txt https://secure.eicar.org/eicar.com.txt
- The file has been quarantined by Defender for Endpoint on Mac. Use the following command to list all the detected threats:
mdatp threat list