santiago silver - Fotolia
Malware never sleeps, posing a significant problem for enterprises that can't abide any downtime. As the last line...
of defense, administrators need to ensure they have a strong grasp on Windows Defender management.
Malware presents a serious risk for data loss, data theft, and possible breaches in regulatory compliance and business governance. Windows Defender Antivirus (AV) protects endpoints and servers in Windows-based organizations from these attacks. Proper Windows Defender management requires administrators to have the right tools and procedures to secure the company's systems.
Tools for Windows Defender management
IT administrators can use System Center Configuration Manager (SCCM) to deploy Windows Defender AV using the endpoint protection point site system role, then enable endpoint protection using custom client options. This provides access to both default and customized antimalware policies and endpoint system management. The default Configuration Manager monitoring features and alerts handle reporting.
Administrators can deploy and manage Windows Defender AV using Microsoft Intune. Custom Intune policies from the Intune console handle task management and endpoint monitoring and reporting.
Administrators can use Windows Management Instrumentation (WMI) for Windows Defender AV management via Group Policy, SCCM or individual endpoint installation. Administrators familiar with WMI can use Set in the MSFT_MpPreference class and Update in the MSFT_MpSignature class for management and use the MSFT_MpComputerStatus class for reporting.
Administrators who prefer to use PowerShell can use this tool for Windows Defender management in concert with Group Policy, SCCM or individual endpoint installation for configuration with the Set-MpPreference and Update-MpSignature cmdlets in the Windows Defender module. This module provides a series of Get cmdlets for reporting.
Finally, Group Policy and a domain-joined Active Directory environment can support Windows Defender management. A Group Policy Object (GPO) can be used to deploy and enable Windows Defender AV. GPOs can also manage configuration changes in AV, but reporting is not supported through Group Policy.
Dig Deeper on Microsoft messaging and collaboration
Related Q&A from Stephen J. Bigelow
Though machine learning and neural networks are both forms of AI, neural networks are a specific type of ML algorithm. Learn more about their ... Continue Reading
Some enterprises avoid the public cloud due to its multi-tenant nature and data security concerns. Learn what data separation is and how it can keep ... Continue Reading
There are advantages and disadvantages to using NAS or object storage for unstructured data. Find out what to consider when it comes to scalability, ... Continue Reading