title | description | ms.service | ms.localizationpriority | ms.topic | author | ms.author | ms.custom | ms.reviewer | manager | ms.subservice | ms.collection | search.appverid | ms.date | ||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Apply Microsoft Defender Antivirus protection updates to out of date endpoints |
Define when and how updates should be applied for endpoints that haven't updated in a while. |
defender-endpoint |
medium |
conceptual |
denisebmsft |
deniseb |
nextgen |
deniseb |
ngp |
|
met150 |
04/08/2021 |
Applies to:
- Microsoft Defender for Endpoint Plan 1
- Microsoft Defender for Endpoint Plan 2
- Microsoft Defender Antivirus
Platforms
- Windows
With Microsoft Defender Antivirus, your security team can define how long an endpoint can avoid an update or how many scans it can miss before it's required to receive the update and run a scan. This capability is especially useful in environments where devices aren't often connected to a corporate or external network, or for devices that aren't used on a daily basis.
For example, an employee who uses a particular computer takes three days off of work, and doesn't sign on their computer during that time. When the employee returns to work and signs into their computer, Microsoft Defender Antivirus will immediately check and download the latest protection updates, and then run a scan.
If Microsoft Defender Antivirus didn't download protection updates for a specified period, you can set it up to automatically check and download the latest update the next time someone signs in on an endpoint. This configuration is useful if you have globally disabled automatic update downloads on startup.
You can use one of several methods to set up catch-up protection updates:
-
On your Microsoft Configuration Manager console, open the antimalware policy you want to change (select Assets and Compliance in the navigation pane on the left, then expand the tree to Overview > Endpoint Protection > Antimalware Policies)
-
Go to the Security intelligence updates section and configure the following settings:
- Set Force a security intelligence update if the client computer is offline for more than two consecutive scheduled updates to Yes.
- For the If Configuration Manager is used as a source for security intelligence updates..., specify the hours before which the protection updates delivered by Configuration Manager should be considered out of date. This setting causes the next update location to be used, based on the defined fallback source order.
-
Select OK.
-
On your Group Policy management computer, open the Group Policy Management Console, right-click the Group Policy Object you want to configure and then select Edit.
-
In the Group Policy Management Editor go to Computer configuration.
-
Select Policies then Administrative templates.
-
Expand the tree to Windows components > Microsoft Defender Antivirus > Signature Updates.
-
Double-click the Define the number of days after which a catch-up security intelligence update is required setting and set the option to Enabled. Enter the number of days after which you want Microsoft Defender Antivirus to check for and download the latest protection update.
-
Select OK.
Use the following cmdlet:
Set-MpPreference -SignatureUpdateCatchupInterval
For more information about using PowerShell with Microsoft Defender Antivirus, see the following articles:
Use the Set method of the MSFT_MpPreference class for the following properties:
SignatureUpdateCatchupInterval
See the following article for more information and allowed parameters:
You can also specify the number of days after which Microsoft Defender Antivirus protection is considered old or out of date. After the specified number of days, the client will report itself as "out of date" and will show an error to the endpoint user. When an endpoint is considered out of date, Microsoft Defender Antivirus might attempt to download an update from other sources (based on the defined fallback source order).
You can use Group Policy to specify the number of days after which endpoint protection is considered to be out of date.
-
On your Group Policy management machine, open the Group Policy Management Console, right-click the Group Policy Object you want to configure and then select Edit.
-
In the Group Policy Management Editor go to Computer configuration.
-
Select Policies then Administrative templates.
-
Expand the tree to Windows components > Microsoft Defender Antivirus > Signature Updates and configure the following settings:
-
Double-click Define the number of days before spyware definitions are considered out of date and set the option to Enabled. Enter the number of days after which you want Microsoft Defender Antivirus to consider spyware Security intelligence to be out of date.
-
Select OK.
-
Double-click Define the number of days before virus definitions are considered out of date and set the option to Enabled. Enter the number of days after which you want Microsoft Defender Antivirus to consider virus Security intelligence to be out of date.
-
Select OK.
-
You can set the number of consecutive scheduled scans that can be missed before Microsoft Defender Antivirus will force a scan.
The process for enabling this feature is:
-
Set up at least one scheduled scan (see the Scheduled scans article).
-
Enable the catch-up scan feature.
-
Define the number of scans that can be skipped before a catch-up scan occurs.
This feature can be enabled for both full and quick scans.
Tip
We recommend using quick scans for most situations. To learn more, see Quick scan, full scan, and custom scan.
You can use one of several methods to set up catch-up scans:
- Group Policy
- Use PowerShell cmdlets to configure catch-up scans
- Windows Management Instruction (WMI)
- Configuration Manager
-
Ensure you have set up at least one scheduled scan.
-
On your Group Policy management machine, open the Group Policy Management Console, right-click the Group Policy Object you want to configure and select Edit.
-
In the Group Policy Management Editor go to Computer configuration.
-
Select Policies then Administrative templates.
-
Expand the tree to Windows components > Microsoft Defender Antivirus > Scan and configure the following settings:
- If you have set up scheduled quick scans, double-click the Turn on catch-up quick scan setting and set the option to Enabled.
- If you have set up scheduled full scans, double-click the Turn on catch-up full scan setting and set the option to Enabled. Select OK.
- Double-click the Define the number of days after which a catch-up scan is forced setting and set the option to Enabled.
- Enter the number of scans that can be missed before a scan will be automatically run when the user next signs in on the endpoint. The type of scan that is run is determined by the Specify the scan type to use for a scheduled scan (see the Schedule scans article). Select OK.
Note
The Group Policy setting title refers to the number of days. The setting, however, is applied to the number of scans (not days) before the catch-up scan will be run.
Use the following cmdlets:
Set-MpPreference -DisableCatchupFullScan
Set-MpPreference -DisableCatchupQuickScan
For more information about using PowerShell with Microsoft Defender Antivirus, see the following articles:
Use the Set method of the MSFT_MpPreference class for the following properties:
DisableCatchupFullScan
DisableCatchupQuickScan
See the following article for more information and allowed parameters:
-
On your Microsoft Configuration Manager console, open the antimalware policy you want to change (select Assets and Compliance in the navigation pane on the left, then expand the tree to Overview > Endpoint Protection > Antimalware Policies)
-
Go to the Scheduled scans section and Force a scan of the selected scan type if client computer is offline... to Yes.
-
Select OK.
Tip
If you're looking for Antivirus related information for other platforms, see:
- Set preferences for Microsoft Defender for Endpoint on macOS
- Microsoft Defender for Endpoint on Mac
- macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune
- Set preferences for Microsoft Defender for Endpoint on Linux
- Microsoft Defender for Endpoint on Linux
- Configure Defender for Endpoint on Android features
- Configure Microsoft Defender for Endpoint on iOS features
- Deploy Microsoft Defender Antivirus
- Manage Microsoft Defender Antivirus updates and apply baselines
- Manage when protection updates should be downloaded and applied
- Manage event-based forced updates
- Manage updates for mobile devices and virtual machines (VMs)
- Microsoft Defender Antivirus in Windows 10 [!INCLUDE Microsoft Defender for Endpoint Tech Community]