santiago silver - Fotolia
Malware never sleeps, posing a significant problem for enterprises that can't abide any downtime. As the last line...
of defense, administrators need to ensure they have a strong grasp on Windows Defender management.
Malware presents a serious risk for data loss, data theft, and possible breaches in regulatory compliance and business governance. Windows Defender Antivirus (AV) protects endpoints and servers in Windows-based organizations from these attacks. Proper Windows Defender management requires administrators to have the right tools and procedures to secure the company's systems.
Tools for Windows Defender management
IT administrators can use System Center Configuration Manager (SCCM) to deploy Windows Defender AV using the endpoint protection point site system role, then enable endpoint protection using custom client options. This provides access to both default and customized antimalware policies and endpoint system management. The default Configuration Manager monitoring features and alerts handle reporting.
Administrators can deploy and manage Windows Defender AV using Microsoft Intune. Custom Intune policies from the Intune console handle task management and endpoint monitoring and reporting.
Administrators can use Windows Management Instrumentation (WMI) for Windows Defender AV management via Group Policy, SCCM or individual endpoint installation. Administrators familiar with WMI can use Set in the MSFT_MpPreference class and Update in the MSFT_MpSignature class for management and use the MSFT_MpComputerStatus class for reporting.
Administrators who prefer to use PowerShell can use this tool for Windows Defender management in concert with Group Policy, SCCM or individual endpoint installation for configuration with the Set-MpPreference and Update-MpSignature cmdlets in the Windows Defender module. This module provides a series of Get cmdlets for reporting.
Finally, Group Policy and a domain-joined Active Directory environment can support Windows Defender management. A Group Policy Object (GPO) can be used to deploy and enable Windows Defender AV. GPOs can also manage configuration changes in AV, but reporting is not supported through Group Policy.
Dig Deeper on Windows Server management
Related Q&A from Stephen J. Bigelow
Eliciting performance requirements from business end users necessitates a clearly defined scope and the right set of questions. Expert Mary Gorman ... Continue Reading
Requirements fall into three categories: business, user and software. See examples of each one, as well as what constitutes functional and ... Continue Reading
Navigating data center malfunctions when hardware is off premises can be tricky. Organizations must have strong SLAs with their colo provider to ... Continue Reading