Edit

Share via


Review or edit your next-generation protection policies in Microsoft Defender for Business

In Defender for Business, next-generation protection includes robust antivirus and anti-malware protection for computers and mobile devices. Default policies with recommended settings are included in Defender for Business. The default policies are designed to protect your devices and users without hindering productivity. However, you can customize your policies to suit your business needs.

You can choose from several options for managing your next-generation protection policies:

  1. Go to the Microsoft Defender portal (https://security.microsoft.com), and sign in.

  2. In the navigation pane, go to Endpoints > Configuration management > Device configuration. Policies are organized by operating system and policy type.

  3. Select an operating system tab (such as Windows).

  4. Under Next-generation protection, view your list of policies. At a minimum, a default policy using recommended settings is listed. This default policy is assigned to all onboarded devices running operating system you selected in the previous step (such as Windows). You can:

    • Keep your default policy as currently configured.
    • Edit your default policy to make any needed adjustments.
    • Create a new policy.
  5. Use one of the procedures in the following table:

    Task Procedure
    Edit your default policy 1. In the Next-generation protection section, select your default policy, and then choose Edit.

    2. On the General information step, review the information. If necessary, edit the description, and then select Next.

    3. On the Device groups step, either use an existing group, or set up a new group. Then choose Next.

    4. On the Configuration settings step, review and if necessary, edit your security settings, and then choose Next. For more information about the settings, see Next-generation protection settings and options (in this article).

    5. On the Review your policy step, review your current settings. Select Edit to make any needed changes. Then select Update policy.
    Create a new policy 1. In the Next-generation protection section, select Add.

    2. On the General information step, specify a name and description for your policy. You can also keep or change a policy order (see Understand policy order in Microsoft Defender for Business). Then select Next.

    3. On the Device groups step, you can either use an existing group, or create up a new group (see Device groups in Microsoft Defender for Business). Then choose Next.

    4. On the Configuration settings step, review and edit your security settings, and then choose Next. For more information about the settings, see Next-generation protection settings and options (in this article).

    5. On the Review your policy step, review your current settings. Select Edit to make any needed changes. Then select Create policy.

Next-generation protection settings and options

The following table lists settings and options for next-generation protection in Defender for Business.

Setting Description
Real-time protection
Turn on real-time protection Enabled by default. Locates and stops malware from running on devices. We recommend keeping real-time protection turned on. When real-time protection is turned on, it configures the following settings:
Block at first sight Enabled by default. Blocks malware within seconds of detection, increases the time (in seconds) allowed to submit sample files for analysis, and sets your detection level to High. We recommend keeping block at first sight turned on.

When block at first sight is turned on, it configures the following settings for Microsoft Defender Antivirus:
  • Blocking and scanning of suspicious files is set to the High blocking level (CloudBlockLevel).
  • The number of seconds for a file to be blocked and checked is set to 50 seconds (CloudExtendedTimeout).

Important If block at first sight is turned off, it affects CloudBlockLevel and CloudExtendedTimeout for Microsoft Defender Antivirus.
Turn on network protection Enabled in Block mode by default. Protects against phishing scams, exploit-hosting sites, and malicious content on the internet. It also prevents users from turning network protection off.

Network protection can be set to the following modes:
  • Block mode is the default setting. It prevents users from visiting sites considered unsafe. We recommend keeping network protection set to Block mode.
  • Audit mode allows users to visit sites that might be unsafe and tracks network activity to/from such sites.
  • Disabled mode doesn't block users from visiting sites that might be unsafe and doesn't track network activity to or from such sites.
Remediation
Action to take on potentially unwanted apps (PUA) Enabled by default. Blocks items detected as PUA. PUA can include advertising software; bundling software that offers to install other, unsigned software; and evasion software that attempts to evade security features. Although PUA isn't necessarily a virus, malware, or other type of threat, it can affect device performance. You can set PUA protection to the following modes:
  • Enabled is the default setting. It blocks items detected as PUA on devices. We recommend keeping PUA protection enabled.
  • Audit mode takes no action on items detected as PUA.
  • Disabled doesn't detect or take action on items that might be PUA.
Scan
Scheduled scan type Enabled in Quickscan mode by default. Specify a day and time to run weekly antivirus scans. The following scan type options are available:
  • Quickscan checks locations, such as registry keys and startup folders, where malware could be registered to start along with a device. We recommend using the quickscan option.
  • Fullscan checks all files and folders on a device.
  • Disabled means no scheduled scans take place. Users can still run scans on their own devices. (In general, we don't recommend disabling scheduled scans.)

Learn more about scan types.
Day of week to run a scheduled scan Select a day for your regular, weekly antivirus scans to run.
Time of day to run a scheduled scan Select a time to run your regularly scheduled antivirus scans to run.
Use low performance This setting is turned off by default. We recommend keeping this setting turned off. However, you can turn on this setting to limit the device memory and resources used during scheduled scans. Important If you turn on Use low performance, it configures the following settings for Microsoft Defender Antivirus:
User experience
Allow users to access the Windows Security app Enable users to open the Windows Security app on their devices. Users can't override settings that you configure in Defender for Business, but they can run a quick scan or view any detected threats.
Antivirus exclusions Exclusions are processes, files, or folders skipped by Microsoft Defender Antivirus scans. In general, you shouldn't need to define exclusions. Microsoft Defender Antivirus includes many automatic exclusions based on known operating system behavior and typical management files. Every exclusion reduces your level of protection, so it's important to consider carefully what exclusions to define. Before you add any exclusions, see Manage exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus.
Process exclusions Prevent Microsoft Defender Antivirus from scanning files opened by specific processes. When you add a process to the process exclusion list, Microsoft Defender Antivirus doesn't scan files opened by that process, no matter where the files are located. The process itself is scanned unless it's in the file exclusion list. For more information, see Configure exclusions for files opened by processes.
File extension exclusions Prevent Microsoft Defender Antivirus from scanning files with specific extensions. For more information, see Configure and validate exclusions based on file extension and folder location.
File and folder exclusions Prevent Microsoft Defender Antivirus from scanning files in specific folders. For more information, see Contextual file and folder exclusions.

Other preconfigured settings in Defender for Business

The following security settings are preconfigured in Defender for Business:

How default settings in Defender for Business correspond to settings in Microsoft Intune

The following table describes preconfigured settings for Defender for Business and how those settings correspond to what you might see in Intune. If you're using the simplified configuration process in Defender for Business, you don't need to edit these settings.

Setting Description
Cloud protection Also known as cloud-delivered protection or Microsoft Advanced Protection Service (MAPS). Cloud protection works with Microsoft Defender Antivirus and the Microsoft cloud to identify new threats, sometimes even before any devices are affected. By default, AllowCloudProtection is turned on. Learn more about cloud protection.
Monitoring for incoming and outgoing files To monitor incoming and outgoing files, RealTimeScanDirection is set to monitor all files.
Scan network files By default, AllowScanningNetworkFiles isn't enabled, and network files aren't scanned.
Scan email messages By default, AllowEmailScanning isn't enabled, and email messages aren't scanned.
Number of days (0-90) to keep quarantined malware By default, the DaysToRetainCleanedMalware setting is set to zero (0) days. Artifacts that are in quarantine aren't removed automatically.
Submit samples consent By default, SubmitSamplesConsent is set to send safe samples automatically. Examples of safe samples include .bat, .scr, .dll, and .exe files that don't contain personal data. If a file contains personal data, the user receives a request to allow the sample submission to proceed. Learn more about cloud protection and sample submission.
Scan removable drives By default, AllowFullScanRemovableDriveScanning is configured to scan removable drives, such as USB thumb drives on devices. Learn more about anti-malware policy settings.
Run daily quick scan time By default, ScheduleQuickScanTime is set to 2:00 AM. Learn more about scan settings.
Check for signature updates before running scan By default, CheckForSignaturesBeforeRunningScan is configured to check for security intelligence updates before running antivirus/antimalware scans. Learn more about scan settings and Security intelligence updates.
How often (0-24 hours) to check for security intelligence updates By default, SignatureUpdateInterval is configured to check for security intelligence updates every four hours. Learn more about scan settings and Security intelligence updates.

Next steps