Microsoft Defender Antivirus Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- SI-3
- Severity
- H
- CCI
- CCI-001243
- Version
- WNDF-AV-000001
- Vuln IDs
-
- V-213426
- V-75147
- Rule IDs
-
- SV-213426r823024_rule
- SV-89827
Checks: C-14651r820126_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> "Configure detection for potentially unwanted applications" is set to "Enabled" and "Block". Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender If the value "PUAProtection" does not exist, this is a finding. If the value "PUAProtection" is REG_DWORD = 1, this is not a finding.
Fix: F-14649r823023_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> "Configure Detection for Potentially Unwanted Applications" to "Enabled" and "Block".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001243
- Version
- WNDF-AV-000003
- Vuln IDs
-
- V-213427
- V-75151
- Rule IDs
-
- SV-213427r823026_rule
- SV-89831
Checks: C-14652r820128_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> "Turn off routine remediation" is set to "Disabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender Criteria: If the value "DisableRoutinelyTakingAction" is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is 1, this is a finding.
Fix: F-14650r823025_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> "Turn off routine remediation" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- H
- CCI
- CCI-001242
- Version
- WNDF-AV-000004
- Vuln IDs
-
- V-213428
- V-75153
- Rule IDs
-
- SV-213428r823028_rule
- SV-89833
Checks: C-14653r820131_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> "Turn off Windows Defender Antivirus" is set to “Not Configured”. For Windows 10: Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender Criteria: If the value "DisableAntiSpyware" does not exist, this is not a finding.
Fix: F-14651r823027_fix
For Windows 10: Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus "Turn off Microsoft Defender Antivirus" to "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000005
- Vuln IDs
-
- V-213429
- V-75155
- Rule IDs
-
- SV-213429r823030_rule
- SV-89835
Checks: C-14654r820134_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Exclusions >> "Path Exclusions" is set to "Disabled" or "Not Configured. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Exclusions Criteria: If the value "Exclusions_Paths" does not exist, this is not a finding.
Fix: F-14652r823029_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Exclusions >> "Path Exclusions" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000006
- Vuln IDs
-
- V-213430
- V-75157
- Rule IDs
-
- SV-213430r823032_rule
- SV-89837
Checks: C-14655r820137_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Exclusions >> "Process Exclusions" is set to "Disabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Exclusions Criteria: If the value "Exclusions_Processes" does not exist, this is not a finding.
Fix: F-14653r823031_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Exclusions >> "Process Exclusions" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000007
- Vuln IDs
-
- V-213431
- V-75159
- Rule IDs
-
- SV-213431r823034_rule
- SV-89839
Checks: C-14656r820140_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Exclusions >> "Turn off Auto Exclusions" is set to "Disabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Exclusions Criteria: If the value "DisableAutoExclusions" is REG_DWORD = 0, this is not a finding.
Fix: F-14654r823033_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Exclusions >> "Turn off Auto Exclusions" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000008
- Vuln IDs
-
- V-213432
- V-75161
- Rule IDs
-
- SV-213432r823036_rule
- SV-89841
Checks: C-14657r820143_chk
This is applicable to unclassified systems. For other systems this is NA. Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MAPS >> "Configure local setting override for reporting to Microsoft MAPS" is set to "Disabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Spynet Criteria: If the value "LocalSettingOverrideSpynetReporting" is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is 1, this is a finding.
Fix: F-14655r823035_fix
This is applicable to unclassified systems. For other systems this is NA. Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MAPS >> "Configure local setting override for reporting to Microsoft MAPS" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000009
- Vuln IDs
-
- V-213433
- V-75163
- Rule IDs
-
- SV-213433r823038_rule
- SV-89843
Checks: C-14658r820146_chk
This is applicable to unclassified systems. For other systems this is NA. Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MAPS >> "Configure the 'Block at First Sight' feature" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Spynet Criteria: If the value "DisableBlockAtFirstSeen" is REG_DWORD = 0, this is not a finding.
Fix: F-14656r823037_fix
This is applicable to unclassified systems. For other systems this is NA. Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MAPS >> "Configure the 'Block at First Sight' feature" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000010
- Vuln IDs
-
- V-213434
- V-75167
- Rule IDs
-
- SV-213434r823040_rule
- SV-89847
Checks: C-14659r820149_chk
This is applicable to unclassified systems. For other systems this is NA. Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MAPS >> "Join Microsoft MAPS" is set to "Enabled" and "Advanced MAPS" is selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Spynet Criteria: If the value "SpynetReporting" is REG_DWORD = 2, this is not a finding.
Fix: F-14657r823039_fix
This is applicable to unclassified systems. For other systems this is NA. Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MAPS >> "Join Microsoft MAPS" to "Enabled" and select "Advanced MAPS" from the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000011
- Vuln IDs
-
- V-213435
- V-75207
- Rule IDs
-
- SV-213435r823042_rule
- SV-89887
Checks: C-14660r820152_chk
This is applicable to unclassified systems. For other systems this is NA. Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MAPS >> "Send file samples when further analysis is required" is set to "Enabled" and "Send safe samples" is selected from the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Spynet Criteria: If the value "SubmitSamplesConsent" is REG_DWORD = 1, this is not a finding.
Fix: F-14658r823041_fix
This is applicable to unclassified systems. For other systems this is NA. Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> MAPS >> "Send file samples when further analysis is required" to "Enabled" and select "Send safe samples" from the drop-down box.
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000012
- Vuln IDs
-
- V-213436
- V-75209
- Rule IDs
-
- SV-213436r823044_rule
- SV-89889
Checks: C-14661r820155_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Network Inspection System >> "Turn on protocol recognition" is set to "Enabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\NIS Criteria: If the value "DisableProtocolRecognition" is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is 1, this is a finding.
Fix: F-14659r823043_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Network Inspection System >> "Turn on protocol recognition" to "Enabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- WNDF-AV-000013
- Vuln IDs
-
- V-213437
- V-75211
- Rule IDs
-
- SV-213437r823046_rule
- SV-89891
Checks: C-14662r820158_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override for monitoring file and program activity on your computer" is set to "Disabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection Criteria: If the value "LocalSettingOverrideDisableOnAccessProtection" is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is 1, this is a finding.
Fix: F-14660r823045_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override for monitoring file and program activity on your computer" to "Disabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- WNDF-AV-000014
- Vuln IDs
-
- V-213438
- V-75213
- Rule IDs
-
- SV-213438r823048_rule
- SV-89893
Checks: C-14663r820161_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override for monitoring for incoming and outgoing file activity" is set to "Disabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection Criteria: If the value "LocalSettingOverrideRealtimeScanDirection" is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is 1, this is a finding.
Fix: F-14661r823047_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override for monitoring for incoming and outgoing file activity" to "Disabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- WNDF-AV-000015
- Vuln IDs
-
- V-213439
- V-75215
- Rule IDs
-
- SV-213439r823050_rule
- SV-89895
Checks: C-14664r820164_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override for scanning all downloaded files and attachments" is set to "Disabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection Criteria: If the value "LocalSettingOverrideDisableIOAVProtection" is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is 1, this is a finding.
Fix: F-14662r823049_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override for scanning all downloaded files and attachments" to "Disabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000016
- Vuln IDs
-
- V-213440
- V-75217
- Rule IDs
-
- SV-213440r823052_rule
- SV-89897
Checks: C-14665r820167_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override for turn on behavior monitoring" is set to "Disabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection Criteria: If the value "LocalSettingOverrideDisableBehaviorMonitoring" is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is 1, this is a finding.
Fix: F-14663r823051_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override for turn on behavior monitoring" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000017
- Vuln IDs
-
- V-213441
- V-75219
- Rule IDs
-
- SV-213441r823054_rule
- SV-89899
Checks: C-14666r820170_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override to turn on real-time protection" is set to "Disabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection Criteria: If the value "LocalSettingOverrideDisableRealtimeMonitoring" is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is 1, this is a finding.
Fix: F-14664r823053_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure local setting override to turn on real-time protection" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000018
- Vuln IDs
-
- V-213442
- V-75221
- Rule IDs
-
- SV-213442r823056_rule
- SV-89901
Checks: C-14667r820173_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure monitoring for incoming and outgoing file and program activity" is set to "Disabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection Criteria: If the value "RealtimeScanDirection" is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is 1 or 2, this is a finding.
Fix: F-14665r823055_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Configure monitoring for incoming and outgoing file and program activity" to "Disabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000019
- Vuln IDs
-
- V-213443
- V-75223
- Rule IDs
-
- SV-213443r823058_rule
- SV-89903
Checks: C-14668r820176_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Monitor file and program activity on your computer to be scanned" is set to "Enabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection Criteria: If the value "DisableOnAccessProtection" is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is 1, this is a finding.
Fix: F-14666r823057_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Monitor file and program activity on your computer" to "Enabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001169
- Version
- WNDF-AV-000020
- Vuln IDs
-
- V-213444
- V-75225
- Rule IDs
-
- SV-213444r823060_rule
- SV-89905
Checks: C-14669r820179_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Scan all downloaded files and attachments" is set to "Enabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection Criteria: If the value "DisableIOAVProtection" is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is 1, this is a finding.
Fix: F-14667r823059_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Scan all downloaded files and attachments" to "Enabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000021
- Vuln IDs
-
- V-213445
- V-75227
- Rule IDs
-
- SV-213445r823062_rule
- SV-89907
Checks: C-14670r820182_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Turn off real-time protection" is set to "Disabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection Criteria: If the value "DisableRealtimeMonitoring" is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is 1, this is a finding.
Fix: F-14668r823061_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Turn off real-time protection" to "Disabled" or "Not Configured".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000022
- Vuln IDs
-
- V-213446
- V-75229
- Rule IDs
-
- SV-213446r823063_rule
- SV-89909
Checks: C-14671r820185_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Turn on behavior monitoring" is set to "Enabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection Criteria: If the value "DisableBehaviorMonitoring" is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is 1, this is a finding.
Fix: F-14669r820186_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Defender Antivirus >> Real-time Protection >> "Turn on behavior monitoring" to "Enabled " or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000023
- Vuln IDs
-
- V-213447
- V-75231
- Rule IDs
-
- SV-213447r823065_rule
- SV-89911
Checks: C-14672r820188_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Turn on process scanning whenever real-time protection is enabled" is set to "Enabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection Criteria: If the value "DisableScanOnRealtimeEnable" is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is 1, this is a finding.
Fix: F-14670r823064_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Real-time Protection >> "Turn on process scanning whenever real-time protection is enabled" to "Enabled" or "Not Configured".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001242
- Version
- WNDF-AV-000024
- Vuln IDs
-
- V-213448
- V-75233
- Rule IDs
-
- SV-213448r823067_rule
- SV-89913
Checks: C-14673r820191_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> "Scan archive files" is set to "Enabled" or "Not Configured". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Scan Criteria: If the value "DisableArchiveScanning" is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is 1, this is a finding.
Fix: F-14671r823066_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> "Scan archive files" to "Enabled " or "Not Configured".
- RMF Control
- MA-3
- Severity
- M
- CCI
- CCI-000870
- Version
- WNDF-AV-000025
- Vuln IDs
-
- V-213449
- V-75235
- Rule IDs
-
- SV-213449r823068_rule
- SV-89915
Checks: C-14674r820194_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> "Scan removable drives" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Scan Criteria: If the value "DisableRemovableDriveScanning" is REG_DWORD = 0, this is not a finding.
Fix: F-14672r820195_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Defender Antivirus >> Scan >> "Scan removable drives" to "Enabled".
- RMF Control
- SI-3
- Severity
- M
- CCI
- CCI-001241
- Version
- WNDF-AV-000026
- Vuln IDs
-
- V-213450
- V-75237
- Rule IDs
-
- SV-213450r823070_rule
- SV-89917
Checks: C-14675r820197_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> "Specify the day of the week to run a scheduled scan" is set to "Enabled" and anything other than "Never" is selected in the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Scan Criteria: If the value "ScheduleDay" is REG_DWORD = 0x8, this is a finding. Values of 0x0 through 0x7 are acceptable and not a finding.
Fix: F-14673r823069_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> "Specify the day of the week to run a scheduled scan" to "Enabled " and select anything other than "Never" in the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000027
- Vuln IDs
-
- V-213451
- V-75239
- Rule IDs
-
- SV-213451r823072_rule
- SV-89919
Checks: C-14676r820200_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> "Turn on e-mail scanning" is set to "Enabled". Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Scan Criteria: If the value "DisableEmailScanning" is REG_DWORD = 0, this is not a finding.
Fix: F-14674r823071_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Scan >> "Turn on e-mail scanning" to "Enabled".
- RMF Control
- SI-3
- Severity
- H
- CCI
- CCI-001240
- Version
- WNDF-AV-000028
- Vuln IDs
-
- V-213452
- V-75241
- Rule IDs
-
- SV-213452r823073_rule
- SV-89921
Checks: C-14677r820203_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Security Intelligence Updates >> "Define the number of days before spyware security intelligence considered out of date" is set to "Enabled" and "7" or less is selected in the drop-down box (excluding "0", which is unacceptable). If third-party antispyware is installed and up to date, the Windows Defender AV spyware age requirement will be NA. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Signature Updates Criteria: If the value "ASSignatureDue" is REG_DWORD = 7, this is not a finding. A value of 1 - 6 is also acceptable and not a finding. A value of 0 is a finding. A value higher than 7 is a finding.
Fix: F-14675r820204_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows Defender Antivirus >> Signature Updates >> "Define the number of days before spyware definitions are considered out of date" to "Enabled" and select "7" or less in the drop-down box. Do not select a value of 0. This disables the option.
- RMF Control
- SI-3
- Severity
- H
- CCI
- CCI-001240
- Version
- WNDF-AV-000029
- Vuln IDs
-
- V-213453
- V-75243
- Rule IDs
-
- SV-213453r823075_rule
- SV-89923
Checks: C-14678r820206_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >>Security Intelligence Updates >> "Define the number of days before virus security intelligence considered out of date" is set to "Enabled" and "7" or less is selected in the drop-down box (excluding "0", which is unacceptable). If third-party antivirus protection is installed and up to date, the Windows Defender Antivirus age requirement is NA. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Signature Updates Criteria: If the value "AVSignatureDue" is REG_DWORD = 7, this is not a finding. A value of 1 - 6 is also acceptable and not a finding. A value of 0 is a finding. A value higher than 7 is a finding.
Fix: F-14676r823074_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Signature Updates >> "Define the number of days before virus definitions are considered out of date" to "Enabled" and select "7" or less in the drop-down box. Do not select a value of 0. This disables the option.
- RMF Control
- SI-8
- Severity
- M
- CCI
- CCI-001308
- Version
- WNDF-AV-000030
- Vuln IDs
-
- V-213454
- V-75245
- Rule IDs
-
- SV-213454r823077_rule
- SV-89925
Checks: C-14679r820209_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Security Intelligence Updates >> "Specify the day of the week to check for security intelligence updates" is set to "Enabled" and "Every Day" is selected in the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Signature Updates Criteria: If the value "ScheduleDay" is REG_DWORD = 0, this is not a finding.
Fix: F-14677r823076_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Signature Updates >> "Specify the day of the week to check for definition updates" to "Enabled" and select "Every Day" in the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- WNDF-AV-000031
- Vuln IDs
-
- V-213455
- V-75247
- Rule IDs
-
- SV-213455r823079_rule
- SV-89927
Checks: C-14680r820212_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Threats >> "Specify threat alert levels at which default action should not be taken when detected" is set to "Enabled". Click the “Show…” box option and verify the "Value name" field contains a value of "5" and the "Value" field contains "2". A value of "3" in the "Value" field is more restrictive and also an acceptable value. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction Criteria: If the value "5" is REG_SZ = 2 (or 3), this is not a finding.
Fix: F-14678r823078_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Threats >> "Specify threat alert levels at which default action should not be taken when detected" to "Enabled". Select the "Show…" option box and enter "5" in the "Value name" field and enter "2" in the "Value" field.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000032
- Vuln IDs
-
- V-213456
- V-77965
- Rule IDs
-
- SV-213456r823081_rule
- SV-92661
Checks: C-14681r820215_chk
This setting is applicable starting with v1709 of Windows 10. It is NA for prior versions. Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" is set to "Enabled”. Click "Show...". Verify the rule ID in the Value name column and the desired state in the Value column is set as follows: Value name: BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550 Value: 1 Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules Criteria: If the value "BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550" is REG_SZ = 1, this is not a finding.
Fix: F-14679r823080_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000033
- Vuln IDs
-
- V-213457
- V-77967
- Rule IDs
-
- SV-213457r823083_rule
- SV-92663
Checks: C-14682r820218_chk
This setting is applicable starting with v1709 of Windows 10. It is NA for prior versions. Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" is set to "Enabled”. Click "Show...". Verify the rule ID in the Value name column and the desired state in the Value column is set as follows: Value name: D4F940AB-401B-4EFC-AADC-AD5F3C50688A Value: 1 Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules Criteria: If the value "D4F940AB-401B-4EFC-AADC-AD5F3C50688A" is REG_SZ = 1, this is not a finding.
Fix: F-14680r823082_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "D4F940AB-401B-4EFC-AADC-AD5F3C50688A" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000034
- Vuln IDs
-
- V-213458
- V-77969
- Rule IDs
-
- SV-213458r823085_rule
- SV-92665
Checks: C-14683r820221_chk
This setting is applicable starting with v1709 of Windows 10. It is NA for prior versions. Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" is set to "Enabled”. Click "Show...". Verify the rule ID in the Value name column and the desired state in the Value column is set as follows: Value name: 3B576869-A4EC-4529-8536-B80A7769E899 Value: 1 Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules Criteria: If the value "3B576869-A4EC-4529-8536-B80A7769E899" is REG_SZ = 1, this is not a finding.
Fix: F-14681r823084_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "3B576869-A4EC-4529-8536-B80A7769E899" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000035
- Vuln IDs
-
- V-213459
- V-77971
- Rule IDs
-
- SV-213459r823087_rule
- SV-92667
Checks: C-14684r820224_chk
This setting is applicable starting with v1709 of Windows 10. It is NA for prior versions. Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" is set to "Enabled”. Click "Show...". Verify the rule ID in the Value name column and the desired state in the Value column is set as follows: Value name: 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84 Value: 1 Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules Criteria: If the value "75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84" is REG_SZ = 1, this is not a finding.
Fix: F-14682r823086_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000036
- Vuln IDs
-
- V-213460
- V-77973
- Rule IDs
-
- SV-213460r823089_rule
- SV-92669
Checks: C-14685r820227_chk
This setting is applicable starting with v1709 of Windows 10. It is NA for prior versions. Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" is set to "Enabled". Click "Show...". Verify the rule ID in the Value name column and the desired state in the Value column is set as follows: Value name: D3E037E1-3EB8-44C8-A917-57927947596D Value: 1 Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules Criteria: If the value "D3E037E1-3EB8-44C8-A917-57927947596D" is REG_SZ = 1, this is not a finding.
Fix: F-14683r823088_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "D3E037E1-3EB8-44C8-A917-57927947596D" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000037
- Vuln IDs
-
- V-213461
- V-77975
- Rule IDs
-
- SV-213461r823091_rule
- SV-92671
Checks: C-14686r820230_chk
This setting is applicable starting with v1709 of Windows 10. It is NA for prior versions. Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" is set to "Enabled”. Click "Show...". Verify the rule ID in the Value name column and the desired state in the Value column is set as follows: Value name: 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC Value: 1 Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules Criteria: If the value "5BEB7EFE-FD9A-4556-801D-275E5FFC04CC" is REG_SZ = 1, this is not a finding.
Fix: F-14684r823090_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "5BEB7EFE-FD9A-4556-801D-275E5FFC04CC" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000038
- Vuln IDs
-
- V-213462
- V-77977
- Rule IDs
-
- SV-213462r823093_rule
- SV-92673
Checks: C-14687r820233_chk
This setting is applicable starting with v1709 of Windows 10. It is NA for prior versions. Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" is set to "Enabled". Click "Show...". Verify the rule ID in the Value name column and the desired state in the Value column is set as follows: Value name: 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B Value: 1 Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\ASR\Rules Criteria: If the value "92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B" is REG_SZ = 1, this is not a finding.
Fix: F-14685r823092_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Attack Surface Reduction >> "Configure Attack Surface Reduction rules" to "Enabled". Click "Show...". Set the Value name to "92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B" and the Value to "1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- WNDF-AV-000039
- Vuln IDs
-
- V-213463
- V-77979
- Rule IDs
-
- SV-213463r823095_rule
- SV-92675
Checks: C-14688r820236_chk
This setting is applicable starting with v1709 of Windows 10, it is NA for prior versions. Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Microsoft Defender Exploit Guard >> Network Protection >> "Prevent users and apps from accessing dangerous websites" is set to "Enabled” and "Block" is selected in the drop-down box. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\Network Protection Criteria: If the value "EnableNetworkProtection" is REG_DWORD = 1, this is not a finding.
Fix: F-14686r823094_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Windows Defender Exploit Guard >> Network Protection >> "Prevent users and apps from accessing dangerous websites" to "Enabled" and select "Block" in the drop-down box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- WNDF-AV-000040
- Vuln IDs
-
- V-213464
- V-79965
- Rule IDs
-
- SV-213464r823097_rule
- SV-94669
Checks: C-14689r820239_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Threats >> "Specify threat alert levels at which default action should not be taken when detected" is set to "Enabled". Click the "Show…" box option and verify the "Value name" field contains a value of "4" and the "Value" field contains a "2". A value of "3" in the "Value" field is more restrictive and also an acceptable value. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction Criteria: If the value "4" is REG_SZ = 2 (or 3), this is not a finding.
Fix: F-14687r823096_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Threats >> "Specify threat alert levels at which default action should not be taken when detected" to "Enabled". Select the "Show…" option box and enter "4" in the "Value name" field and enter "2" in the "Value" field.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- WNDF-AV-000041
- Vuln IDs
-
- V-213465
- V-79967
- Rule IDs
-
- SV-213465r823099_rule
- SV-94671
Checks: C-14690r820242_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Threats >> "Specify threat alert levels at which default action should not be taken when detected" is set to "Enabled". Click the "Show…" box option and verify the "Value name" field contains a value of "2" and the "Value" field contains a "2". A value of "3" in the "Value" field is more restrictive and also an acceptable value. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction Criteria: If the value "2" is REG_SZ = 2 (or 3), this is not a finding.
Fix: F-14688r823098_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Threats >> "Specify threat alert levels at which default action should not be taken when detected" to "Enabled". Select the "Show…" option box and enter "2" in the "Value name" field and enter "2" in the "Value" field.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- WNDF-AV-000042
- Vuln IDs
-
- V-213466
- V-79971
- Rule IDs
-
- SV-213466r823101_rule
- SV-94675
Checks: C-14691r820245_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Threats >> "Specify threat alert levels at which default action should not be taken when detected" is set to "Enabled". Click the "Show…" box option and verify the "Value name" field contains a value of "1" and the "Value" field contains a "2". A value of "3" in the "Value" field is more restrictive and also an acceptable value. Procedure: Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\Windows Defender\Threats\ThreatSeverityDefaultAction Criteria: If the value "1" is REG_SZ = 2 (or 3), this is not a finding.
Fix: F-14689r823100_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Threats >> "Specify threat alert levels at which default action should not be taken when detected" to "Enabled". Select the "Show…" option box and enter "1" in the "Value name" field and enter "2" in the "Value" field.