Skip to content

Commit

Permalink
Merge pull request #2552 from YongRhee-MSFT/docs-editor/microsoft-def…
Browse files Browse the repository at this point in the history
…ender-antivirus-c-1737991884

Update microsoft-defender-antivirus-compatibility.md
  • Loading branch information
Ruchika-mittal01 authored Jan 31, 2025
2 parents 50fe12c + f26b4e7 commit d278ad3
Showing 1 changed file with 6 additions and 8 deletions.
14 changes: 6 additions & 8 deletions defender-endpoint/microsoft-defender-antivirus-compatibility.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ description: Learn about Microsoft Defender Antivirus with other security produc
ms.service: defender-endpoint
ms.subservice: ngp
ms.localizationpriority: medium
ms.date: 01/23/2025
ms.date: 01/30/2025
ms.topic: conceptual
author: emmwalshh
ms.author: ewalsh
Expand Down Expand Up @@ -199,10 +199,9 @@ Defender for Endpoint affects whether Microsoft Defender Antivirus can run in pa

> [!IMPORTANT]
> - [Endpoint data loss prevention](/microsoft-365/compliance/endpoint-dlp-learn-about) protection continues to operate normally when Microsoft Defender Antivirus is in either active or passive mode.
>
> - Don't disable, stop, or modify any of the associated services that are used by Microsoft Defender Antivirus, Defender for Endpoint, or the Windows Security app. This recommendation includes the `wscsvc`, `SecurityHealthService`, `MsSense`, `Sense`, `WinDefend`, or `MsMpEng` services and processes. Manually modifying these services can cause severe instability on your devices and can make your network vulnerable. Disabling, stopping, or modifying those services can also cause problems when using non-Microsoft antivirus solutions and how their information is displayed in the [Windows Security app](microsoft-defender-security-center-antivirus.md).
>
> - Don't disable, stop, or modify any of the associated services that are used by Microsoft Defender Antivirus, Defender for Endpoint, or the Windows Security app. This recommendation includes the `wscsvc`, `SecurityHealthService`, `MsSense`, `Sense`, `WinDefend`, or `MsMpEng` services and processes. Manually modifying these services can cause severe instability on your devices and can make your network vulnerable. Disabling, stopping, or modifying those services can also cause problems when using non-Microsoft antivirus solutions and how their information is displayed in the [Windows Security app](microsoft-defender-security-center-antivirus.md).
> - In Defender for Endpoint, you can turn EDR in block mode on, even if Microsoft Defender Antivirus isn't your primary antivirus solution. EDR in block mode detects and remediate malicious items that are found on the device (post breach). To learn more, see [EDR in block mode](edr-in-block-mode.md).
> - In Defender for Endpoint, EDR response actions always operate in passive mode, even if EDR is not in block mode.
## How to confirm the state of Microsoft Defender Antivirus

Expand All @@ -215,12 +214,11 @@ You can use one of several methods to confirm the state of Microsoft Defender An

> [!IMPORTANT]
> Beginning with [platform version 4.18.2208.0 and later](microsoft-defender-antivirus-updates.md#platform-and-engine-releases): If a server has been onboarded to Microsoft Defender for Endpoint, the "Turn off Windows Defender" [group policy](configure-endpoints-gp.md#update-endpoint-protection-configuration) setting no longer completely disables Windows Defender Antivirus on Windows Server 2012 R2 and later. Instead, it places Microsoft Defender Antivirus into passive mode. In addition, the [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) allows a switch to active mode, but not to passive mode.
>
> - If "Turn off Windows Defender" is already in place before onboarding to Microsoft Defender for Endpoint, Microsoft Defender Antivirus remains disabled.
> - To switch Microsoft Defender Antivirus to passive mode, even if it was disabled before onboarding, you can apply the [ForceDefenderPassiveMode configuration](switch-to-mde-phase-2.md#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server) with a value of `1`. To place it into active mode, switch this value to `0` instead.
>
> Note the modified logic for `ForceDefenderPassiveMode` when tamper protection is enabled: Once Microsoft Defender Antivirus is toggled to active mode, tamper protection prevents it from going back into passive mode even when `ForceDefenderPassiveMode` is set to `1`.
>Microsoft Defender for Endpoint – EDR response actions always operate in Passive mode, even if EDR is in block mode.
> [!Note]
> The modified logic for `ForceDefenderPassiveMode` when tamper protection is enabled: Once Microsoft Defender Antivirus is toggled to active mode, tamper protection prevents it from going back into passive mode even when `ForceDefenderPassiveMode` is set to `1`.
### Use the Windows Security app to identify your antivirus app

Expand Down

0 comments on commit d278ad3

Please sign in to comment.