Skip to content

Microsoft Defender Antivirus Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Microsoft Defender AV must be configured to scan removable drives.

    <VulnDiscussion>This policy setting allows the management of whether or not to scan for malicious software and unwanted software in the conte...
    Rule Medium Severity
  • SRG-APP-000277

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured to perform a weekly scheduled scan.

    &lt;VulnDiscussion&gt;This policy setting allows specifying the day of the week on which to perform a scheduled scan. The scan can also be configur...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured to turn on e-mail scanning.

    &lt;VulnDiscussion&gt;This policy setting allows the configuration of e-mail scanning. When e-mail scanning is enabled, the engine will parse the m...
    Rule Medium Severity
  • SRG-APP-000276

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV spyware definition age must not exceed 7 days.

    &lt;VulnDiscussion&gt;This policy setting allows defining the number of days that must pass before spyware definitions are considered out of date. ...
    Rule High Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV virus definition age must not exceed 7 days.

    &lt;VulnDiscussion&gt;This policy setting allows defining the number of days that must pass before virus definitions are considered out of date. If...
    Rule High Severity
  • SRG-APP-000261

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured to check for definition updates daily.

    &lt;VulnDiscussion&gt;This policy setting allows specifying the day of the week on which to check for definition updates. The check can also be con...
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Severe.

    &lt;VulnDiscussion&gt;This policy setting allows the customization of which automatic remediation action will be taken for each threat alert level....
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured to block executable content from email client and webmail.

    &lt;VulnDiscussion&gt;This rule blocks the following file types from being run or launched from an email seen in either Microsoft Outlook or webmai...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured block Office applications from creating child processes.

    &lt;VulnDiscussion&gt;Office apps, such as Word or Excel, will not be allowed to create child processes. This is a typical malware behavior, especi...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured block Office applications from creating executable content.

    &lt;VulnDiscussion&gt;This rule targets typical behaviors used by suspicious and malicious add-ons and scripts (extensions) that create or launch e...
    Rule Medium Severity
  • Microsoft Defender AV must be configured to block execution of potentially obfuscated scripts.

    &lt;VulnDiscussion&gt;Malware and other threats can attempt to obfuscate or hide their malicious code in some script files. This rule prevents scri...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured to block Win32 imports from macro code in Office.

    &lt;VulnDiscussion&gt;This rule blocks potentially malicious behavior by not allowing macro code to execute routines in the Win 32 dynamic link lib...
    Rule Medium Severity
  • SRG-APP-000210

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured to prevent user and apps from accessing dangerous websites.

    &lt;VulnDiscussion&gt;Enable Microsoft Defender Exploit Guard network protection to prevent employees from using any application to access dangerou...
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level High.

    &lt;VulnDiscussion&gt;This policy setting allows the customization of which automatic remediation action will be taken for each threat alert level....
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Medium.

    &lt;VulnDiscussion&gt;This policy setting allows the customization of which automatic remediation action will be taken for each threat alert level....
    Rule Medium Severity
  • SRG-APP-000207

    <GroupDescription></GroupDescription>
    Group
  • Microsoft Defender AV must be configured for automatic remediation action to be taken for threat alert level Low.

    &lt;VulnDiscussion&gt;This policy setting allows the customization of which automatic remediation action will be taken for each threat alert level....
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules