Rediģēt

Kopīgot, izmantojot


View or edit policies in Microsoft Defender for Business

In Defender for Business, security settings are configured through policies that are applied to devices. To help simplify your setup and configuration experience, Defender for Business includes several preconfigured policies to help protect your company's devices as soon as they are onboarded. There are other types of policies you can create as well (see Set up, review, and edit your security policies and settings in Microsoft Defender for Business).

This article describes how to view, edit, and create security policies in Defender for Business.

This article includes:

Default policies in Defender for Business

In Defender for Business, there are two main types of default policies that are designed to protect your company's devices as soon as they're onboarded:

  • Next-generation protection policies, which determine how Microsoft Defender Antivirus and other threat protection features are configured; and
  • Firewall policies, which determine what network traffic is permitted to flow to and from your company's devices.

Next-generation protection includes robust antivirus and antimalware protection for computers and mobile devices. The default policies are designed to protect your devices and users without hindering productivity. However, you can customize your policies to suit your business needs. For more details, see Review or edit your next-generation protection policies.

Firewall policies help secure devices by establishing rules that determine what network traffic is permitted to flow to and from devices. You can use firewall protection to specify whether to allow or to block connections on devices in various locations. For example, your firewall settings can allow inbound connections on devices that are connected to your company's internal network, but prevent connections when the device is on a network with untrusted devices. For more details, see Firewall.

Policies to set up in Defender for Business

In addition to next-generation protection and firewall policies, there are three other types of policies to configure for the best protection with Defender for Business:

  • Web content filtering, which turns on web protection for your organization.
  • Controlled folder access, which is an important part of ransomware protection (Intune is required to set up and manage)
  • Attack surface reduction rules, which help reduce device vulnerability (Intune is required to set up and manage)

Web content filtering, which enables your security team to track and regulate access to websites based on content categories. Examples of categories include adult content, high bandwidth content, and legal liability content. When you set up your web content filtering policy, you enable web protection for your organization. For more information, see Web content filtering.

Controlled folder access allows only trusted apps to access protected folders on Windows devices. Think of this capability as ransomware mitigation. You can set up or edit your controlled folder access policy in Microsoft Intune. For more information, see Set up or edit your controlled folder access policy.

Attack surface reduction rules target certain software behaviors that are often considered risky because they're commonly abused by attackers through malware. Examples of such behaviors include launching executable files and scripts that attempt to download or run files. Attack surface reduction rules can constrain software-based risky behaviors, and help keep your organization safe. At a minimum, we recommend configuring standard protection rules to help protect your network without causing disruption for users. For more information, see Enable your attack surface reduction rules in Microsoft Defender for Business.

Note

Intune is required to configure controlled folder access and attack surface reduction rules. Intune is not included in the standalone version of Defender for Business, but can be added on to your subscription.

View your existing policies

You can view your existing policies in either Microsoft Defender portal (https://security.microsoft.com) or the Intune admin center (https://intune.microsoft.com) (if you're using Intune).

  1. Go to the Microsoft Defender portal (https://security.microsoft.com), and sign in.

  2. In the navigation pane, choose Configuration management > Device configuration. Policies are organized by operating system (such as Windows client) and policy type (such as Next-generation protection and Firewall).

  3. Select an operating system tab (for example, Windows clients), and then review the list of policies under each category (such as Next-generation protection and Firewall).

  4. To view more details about a policy, select its name. A side pane will open that provides more information about that policy, such as which devices are protected by that policy.

Edit an existing policy

You can view your existing policies in either Microsoft Defender portal (https://security.microsoft.com) or the Intune admin center (https://intune.microsoft.com) (if you're using Intune).

  1. Go to the Microsoft Defender portal (https://security.microsoft.com), and sign in.

  2. In the navigation pane, choose Device configuration. Policies are organized by operating system (such as Windows client) and policy type (such as Next-generation protection and Firewall).

  3. Select an operating system tab (for example, Windows clients), and then review the list of policies under the Next-generation protection and Firewall categories.

  4. To edit a policy, select its name, and then choose Edit.

  5. On the General information tab, review the information. If necessary, you can edit the description. Then choose Next.

  6. On the Device groups tab, determine which device groups should receive this policy.

    • To keep the selected device group as it is, choose Next.
    • To remove a device group from the policy, select Remove.
    • To set up a new device group, select Create new group, and then set up your device group. (To get help with this task, see Device groups.)
    • To apply the policy to another device group, select Use existing group.

    After you have specified which device groups should receive the policy, choose Next.

  7. On the Configuration settings tab, review the settings. If necessary, you can edit the settings for your policy. To get help with this task, see the following articles:

    After you have specified your next-generation protection settings, choose Next.

  8. On the Review your policy tab, review the general information, targeted devices, and configuration settings.

    • Make any needed changes by selecting Edit.
    • When you're ready to proceed, choose Update policy.

Create a new policy

  1. Go to the Microsoft Defender portal (https://security.microsoft.com), and sign in.

  2. In the navigation pane, choose Device configuration. Policies are organized by operating system (such as Windows client) and policy type (such as Next-generation protection and Firewall).

  3. Select an operating system tab (for example, Windows clients), and then review the list of Next-generation protection policies.

  4. Under Next-generation protection or Firewall, select + Add.

  5. On the General information tab, take the following steps:

    1. Specify a name and description. This information will help you and your team identify the policy later on.
    2. Review the policy order, and edit it if necessary. (For more information, see Policy order.)
    3. Choose Next.
  6. On the Device groups tab, either create a new device group, or use an existing group. Policies are assigned to devices through device groups. Here are some things to keep in mind:

    • Initially, you might only have your default device group, which includes the devices people in your company are using to access company data and email. You can keep and use your default device group.
    • Create a new device group to apply a policy with specific settings that are different from the default policy.
    • When you set up your device group, you specify certain criteria, such as the operating system version. Devices that meet the criteria are included in that device group, unless you exclude them.
    • All device groups, including the default and custom device groups that you define, are stored in Microsoft Entra ID.

    To learn more about device groups, see Device groups.

  7. On the Configuration settings tab, specify the settings for your policy, and then choose Next. For more information about the individual settings, see Configuration settings for Defender for Business.

  8. On the Review your policy tab, review the general information, targeted devices, and configuration settings.

    • Make any needed changes by selecting Edit.
    • When you're ready to proceed, choose Create policy.

See also