Defender Profile

Defender Profile encapsulates specifications that protect your system by regulating system scans, protecting from network level threats, and configuring real-time monitoring. You can configure the Defender parameters by creating a profile and associating the profile to the devices or groups.

Kindly note that this profile is applicable only to the Endpoint Central Trial and UEM Security Edition License. This profile is not available in the MDM Standalone Trial License.

Profile Description

Profile SpecificationDescription
Scan ArchivesConfigure it to scan archived files for malicious software and/or unwanted software.
Behavior MonitoringThis option allows you to observe and analyze the activities and actions of applications and processes running on a Windows system.
Cloud ProtectionConfigure Microsoft MAPS for cloud-delivered protection against malware on your endpoints.
Scan EmailScan legacy email media files like MBX, DBX, MIME for detecting threats.
Scan Mapped Network DrivesScan for network drives that are mapped system level for viruses or other threats. User-level mapped network drives are not scanned.
Scan Removable DrivesScan removable drives to detect malware or viruses in files.
Intrusion Prevention SystemConfigure IPS to provide network-level security from network exploits, and other malicious content by blocking any suspicious activity.
Input/Output file protectionThis option lets you check for scanning for all downloaded files and attachments.
Cloud Protection Level

Configure the intensity level for Cloud Protection configuration.

  • Not Configured (default)
  • High
  • High Plus
  • Zero Tolerance
On Access ProtectionConfigure URL authorization rules and built-in request filtering to protect web servers from malicious requests and unauthorized access.
Scan Network filesConfigure real-time scanning for files accessed over the network for malware and viruses.
Real-time MonitoringThis option lets you configure real-time monitoring to identify malware based on known suspicious and malicious activities.
Scan ScriptsConfigure scan for malicious scripts and vulnerabilities.
User Interface LockdownThis option lets you configure whether to lockdown the Defenders' user interface.
Signature update pre-scanThis option allows you to manage whether a check for new viruses and spyware security intelligence will occur before running a scan.
Potentially Unwanted Applications (PUA) ProtectionConfigure detection for potentially unwanted applications that could impact the performance of your system, by displaying ads, running slowly, or installing child applications.
Monitor and ScanThis option lets you configure to determine which NTFS file and program activity is monitored.
Scheduled Scan TypeSpecify the scan type, Quick/Full, to use during the scheduled scan.
Network ProtectionThis option lets you switch from real-time inspection to asynchronous inspection of the network protection to improve performance.
CPU Throttle on scheduled scanThis option indicates whether the CPU will be throttled for the scheduled scans.
Network Protection TelemetryThis option allows you to configure the gathering and sending of performance telemetry from Network Protection, to report telemetry to the Microsoft Defender.
File Hash ComputationThis option lets you compute hash values for files as they are scanned.
Hide Exclusions from Local AdminsThis option allows you to configure whether exclusions are visible to local admins.
Hide Exclusions from Local UsersThis option allows you to configure whether exclusions are visible to local users.

Trusted by