One of the features of Defender Exploit Guard is network protection. It blocks communication with dangerous domains or IP...
Tag Archive for: defender
4sysops - The online community for SysAdmins and DevOps
Configure Defender SmartScreen, activate enhanced phishing protection

Microsoft includes several Windows security components under the term "Defender." One of them is Defender SmartScreen, which aims to...
Configuring Defender Antivirus: Exclusions, real-time protection, scans, and remediations

On most PCs, Defender Antivirus runs with the default settings. However, Microsoft offers admins many options to customize the...
Microsoft Defender: Control updates for malware signatures using Group Policy or PowerShell

Obtaining effective protection by virus scanners requires that they always use the latest definitions. Therefore, Microsoft Defender is not...
Configure Defender exploit protection using PowerShell and Group Policy

Under the term exploit protection, Microsoft brings together several technologies intended to protect against malware attacks. Among them are...
Manage Defender Antivirus using Intune

Defender Antivirus is Microsoft's built-in antivirus, available in Windows 10/11 and Windows Server. You can manage this security component...
Configure attack surface reduction in Microsoft Defender using Group Policy or PowerShell

In addition to the virus scanner, Microsoft Defender offers other security functions. These include the reduction of the attack...
Windows Defender Application Control (WDAC): Secure Windows 10 / 11 against malicious apps and rogue drivers with recommended WDAC block rules

Windows Defender Application Control (WDAC) allows controlling which applications and drivers can run in Windows. Microsoft provides a recommended...
Setting up Microsoft Defender for Business with a simplified configuration

One of the problems with enterprise security is that it has typically been challenging to configure. However, Microsoft Defender...
Turn on Windows 10 Tamper Protection for Microsoft Defender

When hackers gain access to a computer, one of their first goals is to disable the system's security mechanisms....
Overview: Microsoft’s security portfolio under the Defender brand

Azure-named services provide an indication of Azure functionality and capabilities, even if these services provide hybrid cloud features and...
Protect Active Directory with Microsoft Defender for Identity

Microsoft Defender for Identity is a cloud-based security solution that can identify attack signals in Active Directory. The solution...
Mail flow reports in the Microsoft 365 Defender portal

The new Microsoft 365 Defender portal includes some email-related reports that have been moved from the old Security Center....
Import Microsoft Defender Firewall rules from an Excel sheet with PowerShell in Windows 10

With my PowerShell script, you can easily import rules from an Excel sheet to the Microsoft Defender Firewall in...
Microsoft 365 Defender: An overview of Microsoft’s security services

To say that Microsoft's security services naming is puzzling is an understatement. This article will alleviate the confusion and...
Reset Windows 10 password by disabling Windows Defender

A simple hack for resetting a Windows 10 password by abusing tools such as Ultiman.exe, StickyKeys, or DisplaySwitch.exe has...
Application whitelisting: Software Restriction Policies vs. AppLocker vs. Windows Defender Application Control

Blocking unauthorized programs is one of the most effective measures for defending against malware. To this end, Windows contains...
Using the Windows Defender PowerShell cmdlets

There are several ways to manage and configure Windows Defender, such as via the System Center Configuration Manager (SCCM),...