Need more help? Expand your skills. Get new features first. Was this information helpful? Yes No. Thank you! Any more feedback? The more you tell us the more we can help. Can you help us improve? Resolved my issue. Clear instructions. Easy to follow. No jargon. Pictures helped. Didn't match my screen. Incorrect instructions. Note any errors that may appear during this process. Contact Microsoft Support and provide the error information.
Some security applications don't uninstall completely. You may need to download and run a cleanup utility for your previous security application to completely remove it.
When you remove security programs, your computer may be unprotected. If you have problems installing Windows Defender after you remove existing security programs, contact Microsoft Support. Select the Security product family, and then the Windows Defender product. If your computer doesn't appear to be connected, select the connection name, and select Diagnose this connection.
When Windows Defender or Endpoint Protection detects a potential threat, it tries to mitigate the threat by quarantining or removing the threat. These threats can hide inside a compressed archive. If the detected threat was in a compressed archive file, browse to the file. Delete the file, or manually scan it. Right-click the file and select Scan with Windows Defender. If Windows Defender detects additional threats in the file, it notifies you.
Then you can choose an appropriate action. If the detected threat was in a network share, open the share, and manually scan it. If Windows Defender detects additional threats in the network share, it notifies you. This method can be useful for computers that are not often connected to the business network.
Updates from UNC file shares - With this method, you can save the latest definition and engine updates to a share on the network. Clients can then access the network to install the updates. You can configure multiple definition update sources and control the order in which they are assessed and applied. This is done in the Configure Definition Update Sources dialog box when you create an antimalware policy.
Use the following procedure to configure the definition update sources to use for each antimalware policy. Open the properties page of the Default Antimalware Policy or create a new antimalware policy. For more information about how to create antimalware policies, see How to create and deploy antimalware policies for Endpoint Protection. In the Security Intelligence updates section of the antimalware properties dialog box, click Set Source.
0コメント