Microsoft Defender Antivirus STIG SCAP Benchmark
Open a previous version of this SCAP benchmark.
- RMF Control
- SI-3
- Severity
- H
- CCI
- CCI-001243
- Version
- WNDF-AV-000001
- Vuln IDs
- V-213426
- Rule IDs
- SV-213426r961197_rule
Fix: F-14649r823023_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> "Configure Detection for Potentially Unwanted Applications" to "Enabled" and "Block".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001243
- Version
- WNDF-AV-000003
- Vuln IDs
- V-213427
- Rule IDs
- SV-213427r961197_rule
Fix: F-14650r823025_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> "Turn off routine remediation" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- H
- CCI
- CCI-002624
- Version
- WNDF-AV-000004
- Vuln IDs
- V-213428
- Rule IDs
- SV-213428r1190706_rule
Fix: F-14651r823027_fix
For Windows 10: Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus "Turn off Microsoft Defender Antivirus" to "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000005
- Vuln IDs
- V-213429
- Rule IDs
- SV-213429r1190707_rule
Fix: F-14652r823029_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Exclusions >> "Path Exclusions" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000006
- Vuln IDs
- V-213430
- Rule IDs
- SV-213430r1190710_rule
Fix: F-14653r1190709_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Exclusions >> "Process Exclusions" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000007
- Vuln IDs
- V-213431
- Rule IDs
- SV-213431r1190712_rule
Fix: F-14654r823033_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Exclusions >> "Turn off Auto Exclusions" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000008
- Vuln IDs
- V-213432
- Rule IDs
- SV-213432r961092_rule
Fix: F-14655r823035_fix
This is applicable to unclassified systems. For other systems this is NA. Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MAPS >> "Configure local setting override for reporting to Microsoft MAPS" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000009
- Vuln IDs
- V-213433
- Rule IDs
- SV-213433r1190715_rule
Fix: F-14656r1190714_fix
This is applicable to unclassified systems. For other systems this is NA. Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MAPS >> "Configure the 'Block at First Sight' feature" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000010
- Vuln IDs
- V-213434
- Rule IDs
- SV-213434r1134051_rule
Fix: F-14657r1133629_fix
This is applicable to unclassified systems. For other systems this is Not Applicable. Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MAPS >> "Join Microsoft MAPS" to "Enabled" and select "Basic MAPS" or "Advanced MAPS" from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000011
- Vuln IDs
- V-213435
- Rule IDs
- SV-213435r961092_rule
Fix: F-14658r823041_fix
This is applicable to unclassified systems. For other systems this is NA. Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MAPS >> "Send file samples when further analysis is required" to "Enabled" and select "Send safe samples" from the drop-down box.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000012
- Vuln IDs
- V-213436
- Rule IDs
- SV-213436r1190716_rule
Fix: F-14659r823043_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Network Inspection System >> "Turn on protocol recognition" to "Enabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- WNDF-AV-000013
- Vuln IDs
- V-213437
- Rule IDs
- SV-213437r960921_rule
Fix: F-14660r823045_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override for monitoring file and program activity on your computer" to "Disabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- WNDF-AV-000014
- Vuln IDs
- V-213438
- Rule IDs
- SV-213438r960921_rule
Fix: F-14661r823047_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override for monitoring for incoming and outgoing file activity" to "Disabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- WNDF-AV-000015
- Vuln IDs
- V-213439
- Rule IDs
- SV-213439r961089_rule
Fix: F-14662r823049_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override for scanning all downloaded files and attachments" to "Disabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000016
- Vuln IDs
- V-213440
- Rule IDs
- SV-213440r961092_rule
Fix: F-14663r823051_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override for turn on behavior monitoring" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000017
- Vuln IDs
- V-213441
- Rule IDs
- SV-213441r1190717_rule
Fix: F-14664r823053_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override to turn on real-time protection" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000018
- Vuln IDs
- V-213442
- Rule IDs
- SV-213442r1190718_rule
Fix: F-14665r1144027_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure monitoring for incoming and outgoing file and program activity" to "Enabled" with a policy option value of "bi-directional (full on-access)".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000019
- Vuln IDs
- V-213443
- Rule IDs
- SV-213443r1190719_rule
Fix: F-14666r823057_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Monitor file and program activity on your computer" to "Enabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- WNDF-AV-000020
- Vuln IDs
- V-213444
- Rule IDs
- SV-213444r961089_rule
Fix: F-14667r823059_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Scan all downloaded files and attachments" to "Enabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000021
- Vuln IDs
- V-213445
- Rule IDs
- SV-213445r1190720_rule
Fix: F-14668r823061_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Turn off real-time protection" to "Disabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000022
- Vuln IDs
- V-213446
- Rule IDs
- SV-213446r961092_rule
Fix: F-14669r820186_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Defender Antivirus >> Real-time Protection >> "Turn on behavior monitoring" to "Enabled " or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000023
- Vuln IDs
- V-213447
- Rule IDs
- SV-213447r1190721_rule
Fix: F-14670r823064_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Turn on process scanning whenever real-time protection is enabled" to "Enabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000024
- Vuln IDs
- V-213448
- Rule IDs
- SV-213448r1190722_rule
Fix: F-14671r823066_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> "Scan archive files" to "Enabled " or "Not Configured".
- RMF Control
- MA-3
- Severity
- M
- CCI
- CCI-000870
- Version
- WNDF-AV-000025
- Vuln IDs
- V-213449
- Rule IDs
- SV-213449r960852_rule
Fix: F-14672r820195_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Defender Antivirus >> Scan >> "Scan removable drives" to "Enabled".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001241
- Version
- WNDF-AV-000026
- Vuln IDs
- V-213450
- Rule IDs
- SV-213450r961191_rule
Fix: F-14673r823069_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> "Specify the day of the week to run a scheduled scan" to "Enabled " and select anything other than "Never" in the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000027
- Vuln IDs
- V-213451
- Rule IDs
- SV-213451r961092_rule
Fix: F-14674r823071_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> "Turn on e-mail scanning" to "Enabled".
- RMF Control
- Severity
- H
- CCI
- CCI-004964
- Version
- WNDF-AV-000028
- Vuln IDs
- V-213452
- Rule IDs
- SV-213452r1190723_rule
Fix: F-14675r820204_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Defender Antivirus >> Signature Updates >> "Define the number of days before spyware definitions are considered out of date" to "Enabled" and select "7" or less in the drop-down box. Do not select a value of 0. This disables the option.
- RMF Control
- Severity
- H
- CCI
- CCI-004964
- Version
- WNDF-AV-000029
- Vuln IDs
- V-213453
- Rule IDs
- SV-213453r1190724_rule
Fix: F-14676r823074_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Signature Updates >> "Define the number of days before virus definitions are considered out of date" to "Enabled" and select "7" or less in the drop-down box. Do not select a value of 0. This disables the option.
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- WNDF-AV-000030
- Vuln IDs
- V-213454
- Rule IDs
- SV-213454r961161_rule
Fix: F-14677r823076_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Signature Updates >> "Specify the day of the week to check for definition updates" to "Enabled" and select "Every Day" in the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- WNDF-AV-000031
- Vuln IDs
- V-213455
- Rule IDs
- SV-213455r961086_rule
Fix: F-14678r823078_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Threats >> "Specify threat alert levels at which default action should not be taken when detected" to "Enabled". Select the "Show..." option box and enter "5" in the "Value name" field and enter "2" in the "Value" field.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000032
- Vuln IDs
- V-213456
- Rule IDs
- SV-213456r961092_rule
Fix: F-14679r823080_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000033
- Vuln IDs
- V-213457
- Rule IDs
- SV-213457r961092_rule
Fix: F-14680r823082_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "D4F940AB-401B-4EFC-AADC-AD5F3C50688A" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000034
- Vuln IDs
- V-213458
- Rule IDs
- SV-213458r961092_rule
Fix: F-14681r823084_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "3B576869-A4EC-4529-8536-B80A7769E899" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000035
- Vuln IDs
- V-213459
- Rule IDs
- SV-213459r961092_rule
Fix: F-14682r823086_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000036
- Vuln IDs
- V-213460
- Rule IDs
- SV-213460r961092_rule
Fix: F-14683r823088_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "D3E037E1-3EB8-44C8-A917-57927947596D" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000037
- Vuln IDs
- V-213461
- Rule IDs
- SV-213461r961092_rule
Fix: F-14684r823090_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "5BEB7EFE-FD9A-4556-801D-275E5FFC04CC" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000038
- Vuln IDs
- V-213462
- Rule IDs
- SV-213462r961092_rule
Fix: F-14685r823092_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000039
- Vuln IDs
- V-213463
- Rule IDs
- SV-213463r961092_rule
Fix: F-14686r823094_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Network Protection >> "Prevent users and apps from accessing dangerous websites" to "Enabled" and select "Block" in the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- WNDF-AV-000040
- Vuln IDs
- V-213464
- Rule IDs
- SV-213464r961086_rule
Fix: F-14687r823096_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Threats >> "Specify threat alert levels at which default action should not be taken when detected" to "Enabled". Select the "Show..." option box and enter "4" in the "Value name" field and enter "2" in the "Value" field.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- WNDF-AV-000041
- Vuln IDs
- V-213465
- Rule IDs
- SV-213465r961086_rule
Fix: F-14688r823098_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Threats >> "Specify threat alert levels at which default action should not be taken when detected" to "Enabled". Select the "Show..." option box and enter "2" in the "Value name" field and enter "2" in the "Value" field.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- WNDF-AV-000042
- Vuln IDs
- V-213466
- Rule IDs
- SV-213466r961086_rule
Fix: F-14689r823100_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Threats >> "Specify threat alert levels at which default action should not be taken when detected" to "Enabled". Select the "Show..." option box and enter "1" in the "Value name" field and enter "2" in the "Value" field.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000043
- Vuln IDs
- V-278647
- Rule IDs
- SV-278647r1190726_rule
Fix: F-83086r1190725_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c" in the "Value Name" column. Enter "1" in the "Value" column.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000044
- Vuln IDs
- V-278648
- Rule IDs
- SV-278648r1190728_rule
Fix: F-83087r1190727_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2" in the "Value Name" column. Enter "1" in the "Value" column.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000045
- Vuln IDs
- V-278649
- Rule IDs
- SV-278649r1190730_rule
Fix: F-83088r1190729_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4" in the "Value Name" column. Enter "1" in the "Value" column.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000046
- Vuln IDs
- V-278650
- Rule IDs
- SV-278650r1190732_rule
Fix: F-83089r1190731_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "c1db55ab-c21a-4637-bb3f-a12568109d35" in the "Value Name" column. Enter "1" in the "Value" column.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000047
- Vuln IDs
- V-278651
- Rule IDs
- SV-278651r1190734_rule
Fix: F-83090r1190733_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "d1e49aac-8f56-4280-b9ba-993a6d77406c" in the "Value Name" column. Enter "2" in the "Value" column.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000048
- Vuln IDs
- V-278652
- Rule IDs
- SV-278652r1190736_rule
Fix: F-83091r1190735_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "e6db77e5-3df2-4cf1-b95a-636979351e5b" in the "Value Name" column. Enter "2" in the "Value" column.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000049
- Vuln IDs
- V-278653
- Rule IDs
- SV-278653r1190738_rule
Fix: F-83092r1190737_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "01443614-cd74-433a-b99e-2ecdc07bfc25" in the "Value Name" column. Enter "2" in the "Value" column.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000050
- Vuln IDs
- V-278654
- Rule IDs
- SV-278654r1190740_rule
Fix: F-83093r1190739_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "26190899-1602-49e8-8b27-eb1d0a1ce869" in the "Value Name" column. Enter "1" in the "Value" column.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000051
- Vuln IDs
- V-278655
- Rule IDs
- SV-278655r1190742_rule
Fix: F-83094r1190741_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> Configure Attack Surface Reduction rules to "Enabled". Under the policy option "Set the state for each ASR rule:", then click "Show". Enter GUID "56a863a9-875e-4185-98a7-b882c64b5ce5" in the "Value Name" column. Enter "1" in the "Value" column.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000052
- Vuln IDs
- V-278656
- Rule IDs
- SV-278656r1190744_rule
Fix: F-83095r1190743_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Configure local administrator merge behavior for lists to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000054
- Vuln IDs
- V-278658
- Rule IDs
- SV-278658r1190746_rule
Fix: F-83097r1190745_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Control whether exclusions are visible to Local Admins to "Enabled".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000055
- Vuln IDs
- V-278659
- Rule IDs
- SV-278659r1190748_rule
Fix: F-83098r1190747_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Randomize scheduled task times to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000056
- Vuln IDs
- V-278660
- Rule IDs
- SV-278660r1190750_rule
Fix: F-83099r1190749_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Security >> Family Options >> Hide the Family options area to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000057
- Vuln IDs
- V-278661
- Rule IDs
- SV-278661r1190752_rule
Fix: F-83100r1190751_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MpEngine >>Enable file hash computation feature to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000058
- Vuln IDs
- V-278662
- Rule IDs
- SV-278662r1190754_rule
Fix: F-83101r1190753_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MpEngine >> Configure extended cloud check to "Enabled" with a Policy Option value of "50".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000064
- Vuln IDs
- V-278668
- Rule IDs
- SV-278668r1190756_rule
Fix: F-83107r1190755_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> Turn on script scanning to "Enabled".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000065
- Vuln IDs
- V-278669
- Rule IDs
- SV-278669r1190758_rule
Fix: F-83108r1190757_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> Configure real-time protection and Security Intelligence Updates during OOBE to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000068
- Vuln IDs
- V-278672
- Rule IDs
- SV-278672r1190761_rule
Fix: F-83111r1190760_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Network Protection >> This settings controls whether Network Protection is allowed to be configured into block or audit mode on Windows Server to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000070
- Vuln IDs
- V-278674
- Rule IDs
- SV-278674r1190763_rule
Fix: F-83113r1190762_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Features >> Enable EDR in block mode to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000071
- Vuln IDs
- V-278675
- Rule IDs
- SV-278675r1190765_rule
Fix: F-83114r1190764_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Reporting >> Configure whether to report Dynamic Signature dropped events to "Enabled".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000072
- Vuln IDs
- V-278676
- Rule IDs
- SV-278676r1190767_rule
Fix: F-83115r1190766_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> Scan excluded files and directories during quick scans to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000074
- Vuln IDs
- V-278677
- Rule IDs
- SV-278677r1190769_rule
Fix: F-83116r1190768_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Network Inspection System >> Convert warn verdict to block to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000075
- Vuln IDs
- V-278678
- Rule IDs
- SV-278678r1190771_rule
Fix: F-83117r1190770_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Network Inspection System >> Turn on asynchronous inspection to "Enabled".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000076
- Vuln IDs
- V-278679
- Rule IDs
- SV-278679r1190773_rule
Fix: F-83118r1190772_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> Scan packed executables to "Enabled".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-002624
- Version
- WNDF-AV-000077
- Vuln IDs
- V-278680
- Rule IDs
- SV-278680r1190775_rule
Fix: F-83119r1190774_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> Turn on heuristics to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000073
- Vuln IDs
- V-278863
- Rule IDs
- SV-278863r1190777_rule
Fix: F-83302r1190776_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MpEngine >> Select cloud protection level to "Enabled". Set policy value "Select cloud blocking level" to "High blocking level".