Detect and block Potentially Unwanted Applications
- Windows 10
- Enterprise security administrators
Manageability available with
- System Center Configuration Manager
- PowerShell cmdlets
- Microsoft Intune
The Potentially Unwanted Application (PUA) protection feature in Windows Defender Antivirus can identify and block PUAs from downloading and installing on endpoints in your network.
These applications are not considered viruses, malware, or other types of threats, but might perform actions on endpoints that adversely affect their performance or use. PUA can also refer to applications that are considered to have a poor reputation.
Typical PUA behavior includes:
- Various types of software bundling
- Ad-injection into web browsers
- Driver and registry optimizers that detect issues, request payment to fix the errors, but remain on the endpoint and make no changes or optimizations (also known as "rogue antivirus" programs)
These applications can increase the risk of your network being infected with malware, cause malware infections to be harder to identify, and can waste IT resources in cleaning up the applications.
You can also visit the Windows Defender Testground website at demo.wd.microsoft.com to confirm the feature is working and see how it works.
How it works
PUAs are blocked when a user attempts to download or install the detected file, and if the file meets one of the following conditions:
- The file is being scanned from the browser
- The file is in a folder with "downloads" in the path
- The file is in a folder with "temp" in the path
- The file is on the user's Desktop
- The file does not meet one of these conditions and is not under %programfiles%, %appdata%, or %windows%
The file is placed in the quarantine section so it won't run.
When a PUA is detected on an endpoint, the endpoint will present a notification to the user (unless notifications have been disabled) in the same format as normal threat detections (prefaced with "PUA:").
They will also appear in the usual quarantine list in the Windows Defender Security Center app.
View PUA events
PUA events are reported in the Windows Event Viewer and not in System Center Configuration Manager or Intune.
Hoever, PUA detections will be reported if you have set up email notifications for detections.
See Troubleshoot event IDs for details on viewing Windows Defender Antivirus events. PUA events are recorded under event ID 1160.
Configure the PUA protection feature
You can enable the PUA protection feature with System Center Configuration Manager, PowerShell cmdlets, or Microsoft Intune.
You can also use the PUA audit mode to detect PUA without blocking them. The detections will be captured in the Windows event log.
This feature is useful if your company is conducting an internal software security compliance check and you'd like to avoid any false positives.
Use Configuration Manager to configure the PUA protection feature:
PUA protection is enabled by default in System Center Configuration Manager (current branch), including version 1606 and later.
See How to create and deploy antimalware policies: Scheduled scans settings for details on configuring System Center Configuration Manager (current branch).
For Configuration Manager 2012, see How to Deploy Potentially Unwanted Application Protection Policy for Endpoint Protection in Configuration Manager.
PUA events are reported in the Windows Event Viewer and not in System Center Configuration Manager.
Use PowerShell cmdlets to configure the PUA protection feature:
Use the following cmdlet:
Setting the value for this cmdlet to
Enabled will turn the feature on if it has been disabled.
AuditMode will detect PUAs but will not block them.
See Use PowerShell cmdlets to configure and run Windows Defender Antivirus and Defender cmdlets for more information on how to use PowerShell with Windows Defender Antivirus.
Use Intune to configure the PUA protection feature