Microsoft Defender Antivirus STIG SCAP Benchmark
Open a previous version of this SCAP benchmark.
- RMF Control
- SI-3
- Severity
- H
- CCI
- CCI-001243
- Version
- WNDF-AV-000001
- Vuln IDs
- V-213426
- Rule IDs
- SV-213426r961197_rule
Fix: F-14649r823023_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> "Configure Detection for Potentially Unwanted Applications" to "Enabled" and "Block".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001243
- Version
- WNDF-AV-000003
- Vuln IDs
- V-213427
- Rule IDs
- SV-213427r961197_rule
Fix: F-14650r823025_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> "Turn off routine remediation" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- H
- CCI
- CCI-001242
- Version
- WNDF-AV-000004
- Vuln IDs
- V-213428
- Rule IDs
- SV-213428r961194_rule
Fix: F-14651r823027_fix
For Windows 10: Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus "Turn off Microsoft Defender Antivirus" to "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000005
- Vuln IDs
- V-213429
- Rule IDs
- SV-213429r961194_rule
Fix: F-14652r823029_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Exclusions >> "Path Exclusions" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000006
- Vuln IDs
- V-213430
- Rule IDs
- SV-213430r961194_rule
Fix: F-14653r823031_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Exclusions >> "Process Exclusions" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000007
- Vuln IDs
- V-213431
- Rule IDs
- SV-213431r961194_rule
Fix: F-14654r823033_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Exclusions >> "Turn off Auto Exclusions" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000008
- Vuln IDs
- V-213432
- Rule IDs
- SV-213432r961092_rule
Fix: F-14655r823035_fix
This is applicable to unclassified systems. For other systems this is NA. Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MAPS >> "Configure local setting override for reporting to Microsoft MAPS" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000009
- Vuln IDs
- V-213433
- Rule IDs
- SV-213433r961194_rule
Fix: F-14656r823037_fix
This is applicable to unclassified systems. For other systems this is NA. Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MAPS >> "Configure the 'Block at First Sight' feature" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000010
- Vuln IDs
- V-213434
- Rule IDs
- SV-213434r1134051_rule
Fix: F-14657r1133629_fix
This is applicable to unclassified systems. For other systems this is Not Applicable. Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MAPS >> "Join Microsoft MAPS" to "Enabled" and select "Basic MAPS" or "Advanced MAPS" from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000011
- Vuln IDs
- V-213435
- Rule IDs
- SV-213435r961092_rule
Fix: F-14658r823041_fix
This is applicable to unclassified systems. For other systems this is NA. Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MAPS >> "Send file samples when further analysis is required" to "Enabled" and select "Send safe samples" from the drop-down box.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000012
- Vuln IDs
- V-213436
- Rule IDs
- SV-213436r961194_rule
Fix: F-14659r823043_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Network Inspection System >> "Turn on protocol recognition" to "Enabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- WNDF-AV-000013
- Vuln IDs
- V-213437
- Rule IDs
- SV-213437r960921_rule
Fix: F-14660r823045_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override for monitoring file and program activity on your computer" to "Disabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- WNDF-AV-000014
- Vuln IDs
- V-213438
- Rule IDs
- SV-213438r960921_rule
Fix: F-14661r823047_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override for monitoring for incoming and outgoing file activity" to "Disabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- WNDF-AV-000015
- Vuln IDs
- V-213439
- Rule IDs
- SV-213439r961089_rule
Fix: F-14662r823049_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override for scanning all downloaded files and attachments" to "Disabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000016
- Vuln IDs
- V-213440
- Rule IDs
- SV-213440r961092_rule
Fix: F-14663r823051_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override for turn on behavior monitoring" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000017
- Vuln IDs
- V-213441
- Rule IDs
- SV-213441r961194_rule
Fix: F-14664r823053_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override to turn on real-time protection" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000018
- Vuln IDs
- V-213442
- Rule IDs
- SV-213442r1144028_rule
Fix: F-14665r1144027_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure monitoring for incoming and outgoing file and program activity" to "Enabled" with a policy option value of "bi-directional (full on-access)".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000019
- Vuln IDs
- V-213443
- Rule IDs
- SV-213443r961194_rule
Fix: F-14666r823057_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Monitor file and program activity on your computer" to "Enabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- WNDF-AV-000020
- Vuln IDs
- V-213444
- Rule IDs
- SV-213444r961089_rule
Fix: F-14667r823059_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Scan all downloaded files and attachments" to "Enabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000021
- Vuln IDs
- V-213445
- Rule IDs
- SV-213445r961194_rule
Fix: F-14668r823061_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Turn off real-time protection" to "Disabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000022
- Vuln IDs
- V-213446
- Rule IDs
- SV-213446r961092_rule
Fix: F-14669r820186_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Defender Antivirus >> Real-time Protection >> "Turn on behavior monitoring" to "Enabled " or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000023
- Vuln IDs
- V-213447
- Rule IDs
- SV-213447r961194_rule
Fix: F-14670r823064_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Turn on process scanning whenever real-time protection is enabled" to "Enabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000024
- Vuln IDs
- V-213448
- Rule IDs
- SV-213448r961194_rule
Fix: F-14671r823066_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> "Scan archive files" to "Enabled " or "Not Configured".
- RMF Control
- MA-3
- Severity
- M
- CCI
- CCI-000870
- Version
- WNDF-AV-000025
- Vuln IDs
- V-213449
- Rule IDs
- SV-213449r960852_rule
Fix: F-14672r820195_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Defender Antivirus >> Scan >> "Scan removable drives" to "Enabled".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001241
- Version
- WNDF-AV-000026
- Vuln IDs
- V-213450
- Rule IDs
- SV-213450r961191_rule
Fix: F-14673r823069_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> "Specify the day of the week to run a scheduled scan" to "Enabled " and select anything other than "Never" in the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000027
- Vuln IDs
- V-213451
- Rule IDs
- SV-213451r961092_rule
Fix: F-14674r823071_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> "Turn on e-mail scanning" to "Enabled".
- RMF Control
- SI-3
- Severity
- H
- CCI
- CCI-001240
- Version
- WNDF-AV-000028
- Vuln IDs
- V-213452
- Rule IDs
- SV-213452r961188_rule
Fix: F-14675r820204_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Defender Antivirus >> Signature Updates >> "Define the number of days before spyware definitions are considered out of date" to "Enabled" and select "7" or less in the drop-down box. Do not select a value of 0. This disables the option.
- RMF Control
- SI-3
- Severity
- H
- CCI
- CCI-001240
- Version
- WNDF-AV-000029
- Vuln IDs
- V-213453
- Rule IDs
- SV-213453r961188_rule
Fix: F-14676r823074_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Signature Updates >> "Define the number of days before virus definitions are considered out of date" to "Enabled" and select "7" or less in the drop-down box. Do not select a value of 0. This disables the option.
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- WNDF-AV-000030
- Vuln IDs
- V-213454
- Rule IDs
- SV-213454r961161_rule
Fix: F-14677r823076_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Signature Updates >> "Specify the day of the week to check for definition updates" to "Enabled" and select "Every Day" in the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- WNDF-AV-000031
- Vuln IDs
- V-213455
- Rule IDs
- SV-213455r961086_rule
Fix: F-14678r823078_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Threats >> "Specify threat alert levels at which default action should not be taken when detected" to "Enabled". Select the "Show..." option box and enter "5" in the "Value name" field and enter "2" in the "Value" field.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000032
- Vuln IDs
- V-213456
- Rule IDs
- SV-213456r961092_rule
Fix: F-14679r823080_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000033
- Vuln IDs
- V-213457
- Rule IDs
- SV-213457r961092_rule
Fix: F-14680r823082_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "D4F940AB-401B-4EFC-AADC-AD5F3C50688A" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000034
- Vuln IDs
- V-213458
- Rule IDs
- SV-213458r961092_rule
Fix: F-14681r823084_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "3B576869-A4EC-4529-8536-B80A7769E899" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000035
- Vuln IDs
- V-213459
- Rule IDs
- SV-213459r961092_rule
Fix: F-14682r823086_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000036
- Vuln IDs
- V-213460
- Rule IDs
- SV-213460r961092_rule
Fix: F-14683r823088_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "D3E037E1-3EB8-44C8-A917-57927947596D" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000037
- Vuln IDs
- V-213461
- Rule IDs
- SV-213461r961092_rule
Fix: F-14684r823090_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "5BEB7EFE-FD9A-4556-801D-275E5FFC04CC" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000038
- Vuln IDs
- V-213462
- Rule IDs
- SV-213462r961092_rule
Fix: F-14685r823092_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000039
- Vuln IDs
- V-213463
- Rule IDs
- SV-213463r961092_rule
Fix: F-14686r823094_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Network Protection >> "Prevent users and apps from accessing dangerous websites" to "Enabled" and select "Block" in the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- WNDF-AV-000040
- Vuln IDs
- V-213464
- Rule IDs
- SV-213464r961086_rule
Fix: F-14687r823096_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Threats >> "Specify threat alert levels at which default action should not be taken when detected" to "Enabled". Select the "Show..." option box and enter "4" in the "Value name" field and enter "2" in the "Value" field.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- WNDF-AV-000041
- Vuln IDs
- V-213465
- Rule IDs
- SV-213465r961086_rule
Fix: F-14688r823098_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Threats >> "Specify threat alert levels at which default action should not be taken when detected" to "Enabled". Select the "Show..." option box and enter "2" in the "Value name" field and enter "2" in the "Value" field.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- WNDF-AV-000042
- Vuln IDs
- V-213466
- Rule IDs
- SV-213466r961086_rule
Fix: F-14689r823100_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Threats >> "Specify threat alert levels at which default action should not be taken when detected" to "Enabled". Select the "Show..." option box and enter "1" in the "Value name" field and enter "2" in the "Value" field.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000043
- Vuln IDs
- V-278647
- Rule IDs
- SV-278647r1144030_rule
Fix: F-83086r1134292_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c" in the "Value Name" column. Enter "1" in the "Value" column. Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000044
- Vuln IDs
- V-278648
- Rule IDs
- SV-278648r1144032_rule
Fix: F-83087r1134294_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2" in the "Value Name" column. Enter "1" in the "Value" column. Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000045
- Vuln IDs
- V-278649
- Rule IDs
- SV-278649r1144034_rule
Fix: F-83088r1134296_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4" in the "Value Name" column. Enter "1" in the "Value" column. Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000046
- Vuln IDs
- V-278650
- Rule IDs
- SV-278650r1144036_rule
Fix: F-83089r1134275_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "c1db55ab-c21a-4637-bb3f-a12568109d35" in the "Value Name" column. Enter "1" in the "Value" column. Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000047
- Vuln IDs
- V-278651
- Rule IDs
- SV-278651r1144039_rule
Fix: F-83090r1144038_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "d1e49aac-8f56-4280-b9ba-993a6d77406c" in the "Value Name" column. Enter "2" in the "Value" column. Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000048
- Vuln IDs
- V-278652
- Rule IDs
- SV-278652r1144042_rule
Fix: F-83091r1144041_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "e6db77e5-3df2-4cf1-b95a-636979351e5b" in the "Value Name" column. Enter "2" in the "Value" column. Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000049
- Vuln IDs
- V-278653
- Rule IDs
- SV-278653r1144045_rule
Fix: F-83092r1144044_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "01443614-cd74-433a-b99e-2ecdc07bfc25" in the "Value Name" column. Enter "2" in the "Value" column. Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000050
- Vuln IDs
- V-278654
- Rule IDs
- SV-278654r1144047_rule
Fix: F-83093r1134287_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "26190899-1602-49e8-8b27-eb1d0a1ce869" in the "Value Name" column. Enter "1" in the "Value" column. Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000051
- Vuln IDs
- V-278655
- Rule IDs
- SV-278655r1144049_rule
Fix: F-83094r1134290_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "56a863a9-875e-4185-98a7-b882c64b5ce5" in the "Value Name" column. Enter "1" in the "Value" column. Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000052
- Vuln IDs
- V-278656
- Rule IDs
- SV-278656r1144051_rule
Fix: F-83095r1133659_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Configure local administrator merge behavior for lists to "Enabled". Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000054
- Vuln IDs
- V-278658
- Rule IDs
- SV-278658r1156519_rule
Fix: F-83097r1133665_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Control whether or not exclusions are visible to Local Admins to "Enabled". Click "OK". Click "Apply".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000055
- Vuln IDs
- V-278659
- Rule IDs
- SV-278659r1144055_rule
Fix: F-83098r1133668_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Randomize scheduled task times to "Enabled". Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000056
- Vuln IDs
- V-278660
- Rule IDs
- SV-278660r1144057_rule
Fix: F-83099r1133671_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Security >> Family Options >> Hide the Family options area to "Enabled". Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000057
- Vuln IDs
- V-278661
- Rule IDs
- SV-278661r1144059_rule
Fix: F-83100r1133674_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MpEngine >>Enable file hash computation feature to "Enabled". Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000058
- Vuln IDs
- V-278662
- Rule IDs
- SV-278662r1144061_rule
Fix: F-83101r1133677_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MpEngine >> Configure extended cloud check to "Enabled" with a Policy Option value of "50". Click "OK". Click "Apply".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000064
- Vuln IDs
- V-278668
- Rule IDs
- SV-278668r1144063_rule
Fix: F-83107r1133695_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> Turn on script scanning to "Enabled". Click "OK". Click "Apply".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000065
- Vuln IDs
- V-278669
- Rule IDs
- SV-278669r1144065_rule
Fix: F-83108r1133698_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> Configure real-time protection and Security Intelligence Updates during OOBE to "Enabled". Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000068
- Vuln IDs
- V-278672
- Rule IDs
- SV-278672r1144067_rule
Fix: F-83111r1133707_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Network Protection >> This settings controls whether Network Protection is allowed to be configured into block or audit mode on Windows Server to "Enabled". Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000070
- Vuln IDs
- V-278674
- Rule IDs
- SV-278674r1144071_rule
Fix: F-83113r1133713_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Features >> Enable EDR in block mode to "Enabled". Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000071
- Vuln IDs
- V-278675
- Rule IDs
- SV-278675r1144073_rule
Fix: F-83114r1133716_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Reporting >> Configure whether to report Dynamic Signature dropped events to "Enabled". Click "OK". Click "Apply".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000072
- Vuln IDs
- V-278676
- Rule IDs
- SV-278676r1144075_rule
Fix: F-83115r1133719_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> Scan excluded files and directories during quick scans to "Enabled". Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000074
- Vuln IDs
- V-278677
- Rule IDs
- SV-278677r1144077_rule
Fix: F-83116r1134122_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MpEngine >> Convert warn verdict to block to "Enabled". Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000075
- Vuln IDs
- V-278678
- Rule IDs
- SV-278678r1144079_rule
Fix: F-83117r1133725_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MpEngine >> Turn on asynchronous inspection to "Enabled". Click "OK". Click "Apply".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000076
- Vuln IDs
- V-278679
- Rule IDs
- SV-278679r1144081_rule
Fix: F-83118r1133728_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> Scan packed executables to "Enabled". Click "OK". Click "Apply".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000077
- Vuln IDs
- V-278680
- Rule IDs
- SV-278680r1144083_rule
Fix: F-83119r1133731_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> Turn on heuristics to "Enabled". Click "OK". Click "Apply".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000073
- Vuln IDs
- V-278863
- Rule IDs
- SV-278863r1144086_rule
Fix: F-83302r1144085_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MpEngine >> Select cloud protection level to "Enabled". Set policy value "Select cloud blocking level" to "High blocking level". Click "OK". Click "Apply".