Professional Documents
Culture Documents
You can deploy antimalware policies to collections of System Center Configuration Manager client
computers to specify how Endpoint Protection protects them from malware and other threats. These
antimalware policies include information about the scan schedule, the types of files and folders to scan, and
the actions to take when malware is detected. When you enable Endpoint Protection, a default antimalware
policy is applied to client computers. You can also use additional policy templates that are supplied or create
your own custom antimalware policies to meet the specific needs of your environment.
Configuration Manager supplies a selection of predefined templates that are optimized for various scenarios
and can be imported into Configuration Manager. These templates are available in the folder <ConfigMgr
Install Folder>\AdminConsole\XMLStorage\EPTemplates.
) Important
If you create a new antimalware policy and deploy it to a collection, this antimalware policy overrides
the default antimalware policy.
Use the procedures in this topic to create or import antimalware policies and assign them to System Center
Configuration Manager client computers in your hierarchy.
7 Note
Before you perform these procedures, ensure that Configuration Manager is configured for Endpoint
Protection as described in Configuring Endpoint Protection in System Center Configuration Manager.
https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings 1/10
11/26/2018 Endpoint Protection antimalware policies - Configuration Manager | Microsoft Docs
2. In the Assets and Compliance workspace, expand Endpoint Protection, and then click Antimalware
Policies.
3. Select the antimalware policy Default Client Antimalware Policy and then, on the Home tab, in the
Properties group, click Properties.
4. In the Default Antimalware Policy dialog box, configure the settings that you require for this
antimalware policy, and then click OK.
7 Note
For a list of settings that you can configure, see List of Antimalware Policy Settings in this topic.
2. In the Assets and Compliance workspace, expand Endpoint Protection, and then click Antimalware
Policies.
3. On the Home tab, in the Create group, click Create Antimalware Policy.
4. In the General section of the Create Antimalware Policy dialog box, enter a name and a description for
the policy.
5. In the Create Antimalware Policy dialog box, configure the settings that you require for this
antimalware policy, and then click OK. For a list of settings that you can configure, see List of
Antimalware Policy Settings.
6. Verify that the new antimalware policy is displayed in the Antimalware Policies list.
2. In the Assets and Compliance workspace, expand Endpoint Protection, and then click Antimalware
Policies.
https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings 2/10
11/26/2018 Endpoint Protection antimalware policies - Configuration Manager | Microsoft Docs
4. In the Open dialog box, browse to the policy file to import, and then click Open.
5. In the Create Antimalware Policy dialog box, review the settings to use, and then click OK.
6. Verify that the new antimalware policy is displayed in the Antimalware Policies list.
2. In the Assets and Compliance workspace, expand Endpoint Protection, and then click Antimalware
Policies.
3. In the Antimalware Policies list, select the antimalware policy to deploy. Then, on the Home tab, in the
Deployment group, click Deploy.
7 Note
The Deploy option cannot be used with the default client malware policy.
4. In the Select Collection dialog box, select the device collection to which you want to deploy the
antimalware policy, and then click OK.
Scan type - You can specify one of two scan types to run on client computers:
Quick scan - This type of scan checks the in-memory processes and folders where malware is typically
found. It requires fewer resources than a full scan.
Full Scan - This type of scan adds a full check of all local files and folders to the items scanned in the
quick scan. This scan takes longer than a quick scan and uses more CPU processing and memory
resources on client computers.
In most cases, use Quick scan to minimize the use of system resources on client computers. If malware
removal requires a full scan, Endpoint Protection generates an alert that is displayed in the
Configuration Manager console. The default value is Quick scan.
Scan Settings
Scan email and email attachments - Set to Yes to turn on e-mail scanning.
Scan removable storage devices such as USB drives - Set to Yes to scan removable drives during full scans.
Scan mapped network drives when running a full scan - Set to Yes to scan any mapped network drives on
client computers. Enabling this setting might significantly increase the scan time on client computers.
The Scan network files setting must be set to Yes for this setting to be available to configure.
By default, this setting is set to No, meaning that a full scan will not access mapped network drives.
Scan archived files - Set to Yes to scan archived files such as .zip or .rar files.
Allow users to configure CPU usage during scans - Set to Yes to allow users to specify maximum
percentage of CPU utilization during a scan. Scans will not always use the maximum load defined by users,
but they cannot exceed it.
User control of scheduled scans - Specify level of user control. Allow users to set Scan time only or Full
control of antivirus scans on their devices.
Select the action to take when malware is detected on client computers. The following actions can be
applied, depending on the alert threat level of the detected malware.
Enable real-time Set to Yes to configure real-time protection settings for client computers. We recommend
protection that you enable this setting.
Monitor file and Set to Yes if you want Endpoint Protection to monitor when files and programs start to run
program activity on on client computers and to alert you about any actions that they perform or actions taken
your computer on them.
Scan system files This setting lets you configure whether incoming, outgoing, or incoming and outgoing
system files are monitored for malware. For performance reasons, you might have to
change the default value of Scan incoming and outgoing files if a server has high
incoming or outgoing file activity.
Enable behavior Enable this setting to use computer activity and file data to detect unknown threats. When
monitoring this setting is enabled, it might increase the time required to scan computers for malware.
Enable protection Enable this setting to protect computers against known network exploits by inspecting
against network- network traffic and blocking any suspicious activity.
based exploits
Block Potentially Potential Unwanted Applications (PUA) is a threat classification based on reputation and
Unwanted research-driven identification. Most commonly, these are unwanted application bundlers or
Applications at their bundled applications.
download and prior
to installation Beginning in version 1602 of Configuration Manager, this protection policy setting is
available and set to Yes by default. When enabled, this setting blocks PUA at download and
install time. However, you can exclude specific files or folders to meet the specific needs of
your business or organization.
Exclusion Settings
https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings 5/10
11/26/2018 Endpoint Protection antimalware policies - Configuration Manager | Microsoft Docs
If you want to exclude files and folders that are located on a mapped network drive, specify the name of
each folder in the network drive individually. For example, if a network drive is mapped as F:\MyFolder and it
contains subfolders named Folder1, Folder2 and Folder 3, specify the following exclusions:
F:\MyFolder\Folder1
F:\MyFolder\Folder2
F:\MyFolder\Folder3
Beginning in version 1602 of Configuration Manager, the existing Exclude files and folders setting in
the Exclusion settings section of Endpoint Protection antimalware policy is improved to allow device
exclusions. For example, you can now specify the following as an exclusion: \device\mvfs (for
Multiversion File System). The policy does not validate the device path; the Endpoint Protection policy
is provided to the antimalware engine on the client which must be able to interpret the device string.
Advanced Settings
Enable reparse point scanning - Set to Yes if you want Endpoint Protection to scan NTFS reparse points.
For more information about reparse points, see Reparse Points in the Windows Dev Center.
Randomize the scheduled scan start times (within 30 minutes) - Set to Yes to help avoid flooding the
network, which can occur if all computers send their antimalware scans results to the Configuration
Manager database at the same time. This randomizes the start time of the scan to any interval from 0 to 4
hours, or to any interval plus or minus 30 minutes for non-Windows Defender scans. This can be useful in
VM or VDI deployments. This setting is also useful when you run multiple virtual machines on a single host.
Select this option to reduce the amount of simultaneous disk access for antimalware scanning.
Beginning in version 1602 of Configuration Manager, the antimalware engine may request file samples to be
sent to Microsoft for further analysis. By default, it will always prompt before it sends such samples.
Administrators can now manage the following settings to configure this behavior:
Enable auto sample file submission to help Microsoft determine whether certain detected items are
Malicious - Set to Yes to enable auto sample file submission. By default, this setting is No which means auto
sample file submission is disabled and users will be prompted before sending samples.
Allow users to modify auto sample file submission settings - This setting determines whether a user with
local administrative rights on a device can change the auto sample file submission setting in the client
interface. By default, this setting is "No" which means the settings can only be changed from within the
https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings 6/10
11/26/2018 Endpoint Protection antimalware policies - Configuration Manager | Microsoft Docs
Configuration Manager console, and local administrators on a device cannot change this configuration.
For example, the following shows the Windows Defender setting in Windows 10 set by the administrator as
enabled, and the user is not allowed to modify it
Threat name and override action - Click Set to customize the remediation action to take for each threat ID
when it is detected during a scan.
7 Note
The list of threat names might not be available immediately after the configuration of Endpoint
Protection. Wait until the Endpoint Protection point has synchronized the threat information, and then
try again.
Cloud Protection Service enables the collection of information about detected malware on managed virtual
machines and the actions taken. This information is sent to Microsoft.
Allow users to modify Cloud Protection Service settings - Toggles user control of Cloud Protection Service
settings.
https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings 7/10
11/26/2018 Endpoint Protection antimalware policies - Configuration Manager | Microsoft Docs
Level for blocking suspicious files - Specify the level at which the Endpoint Protection Cloud Protection
Service will block suspicious files.
Allow extended cloud check to block and scan for up to (seconds) - Specifies the number of seconds
Cloud Protection Service can block a file while the service checks that the file is not known to be malicious.
Data collected
Frequency or sent Use of data
When Windows - Version of Microsoft uses this information to ensure the latest virus and spyware
Defender virus and updates are present on computers. If not present, Windows Defender
updates virus spyware updates automatically so computer protection stays up-to-date.
and spyware definitions
protection or - Virus and
definition files spyware
protection
version
https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings 8/10
11/26/2018 Endpoint Protection antimalware policies - Configuration Manager | Microsoft Docs
Data collected
Frequency or sent Use of data
If Windows - Name of Windows Defender uses this information to determine the type and
Defender finds potentially severity of potentially unwanted software, and the best action to take.
potentially harmful or Microsoft also uses this information to help improve the accuracy of virus
harmful or unwanted and spyware protection.
unwanted software
software on - How the
computers software was
found
- Any actions
that Windows
Defender took
to deal with the
software
- Files affected
by the software
- Information
about the
computer from
the
manufacturer
(Sysconfig,
SysModel,
SysMarker)
Once a month - Virus and Windows Defender uses this information to verify that computers have the
spyware latest virus and spyware protection version, and the most recent virus and
definition spyware definitions. Microsoft also wants to make sure that real-time virus
update status and spyware monitoring is turned on, which is a critical part of helping
- Status of real- protect computers from potentially harmful or unwanted software.
time virus and
spyware
monitoring (on
or off)
During List of running To identify any processes that might have been compromised by
installation, or processes in potentially harmful software.
whenever users your
manually computer's
perform virus memory
and spyware
scan of your
computer
https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings 9/10
11/26/2018 Endpoint Protection antimalware policies - Configuration Manager | Microsoft Docs
Microsoft collects only the names of affected files, not the contents of the files themselves. This information
helps determine what systems are especially vulnerable to specific threats.
Set sources and order for Endpoint Protection client updates - Click Set Source to specify the sources for
definition and scanning engine updates, and to also specify the order in which they are used. If
Configuration Manager is specified as one of the sources, then the other sources are used only if software
updates fail to download the client updates.
If you use any of the following methods to update the definitions on client computers, then the client
computers must be able to access the Internet.
) Important
Clients download definition updates by using the built-in system account. You must configure a proxy
server for this account to enable these clients to connect to the Internet.
If you have configured a software updates automatic deployment rule to deliver definition updates to
client computers, these updates will be delivered regardless of the definition updates settings.
Back >
https://docs.microsoft.com/en-us/sccm/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings 10/10