Configure Windows Defender using Scalefusion MDM

  • May 28, 2021

Microsoft Defender turns out to be the next-generation protection component for Windows Devices. The prime signature-based antimalware system identifies the potential malware on the windows devices to secure the critical assets of the end-users. Windows Defender scans and detects the current spyware and any potential malware with its forms present in the system. It then also allows IT admins to report the threat to Microsoft with all the signature-based information of what this malware could have done to the system and the intensity of damage it might have been caused.

Guide on Windows Defender
Configure Windows Defender with Scalefusion

With this thought, let’s explore what exactly is Windows Defender and what are its attributes in a Windows system. Also, we will deep dive into the step-by-step process of how a user can configure the Windows Defender into managed devices through Scalefusion MDM.

What are Windows Defender Policies?

Windows Defender which was also known as Windows Defender Antivirus and Microsoft AntiSpyware is an anti-malware component of Microsoft Windows and a software application that detects and prevents any malware to attack the system. Windows Defender provides real-time analysis and protection of windows systems and devices against software with malware threats and viruses, spyware across email, applications, cloud, and the web.

The early versions of Windows defender were released as a downloadable free anti-spyware program but have now evolved into a full-fledged antivirus software application in almost all the windows versions. The purpose of Windows defender is to restrict the unauthorized access of malware by detecting them and safeguard the system containing unwanted software.

Uses and application of Windows Defender Policies

Until the version of Windows 8 was launched in the market, the role of Window Defender was restricted to just protecting the windows system against spyware only. With the later upgrades, it is elevated to detecting real-time security agents that are constantly monitoring the common arena of Windows systems and any changes that might have been implemented due to active spyware. An integrated feature of Microsoft SpyNet was also featured by Windows Defender that allowed the Windows users to report directly to the Microsoft team about the probable spyware present in their system.

Let’s explore the features & applications of Windows Defender Policies in detail below:

1. Real-time protection

In this, the Windows user can configure the settings of real-time protection in the Windows Defender policies. In the latest version of Windows, such as Windows 10, the user can set up a periodic scanning as per their convenience even after an antivirus is installed. Also, the Windows Defender allows the functionality of Block at First Sight wherein the system uses the capability of machine learning to detect if the files are malicious or not.

2. Web browser integration

With the enablement of integrations in Internet Explorer and Microsoft Edge, Windows Defender scans the file to detect any malicious threats in files and software as soon as they are inadvertently downloaded. Windows Defender also works as integration for Google Chrome by adding an extension, but the protection is done in conjunction with Google safe Browsing.

3. Application guard

Application guard is an exclusive feature of Windows Defender Application Guard which was first introduced to Microsoft Edge allowing them to secure their present browsing session by sandboxing it in the system. By sandboxing the session, the prevention of entering any malware or threat which can become a potential threat is detected and alerted in the browser. Later with the present upgrades, the Application Guard is now also available for Google Chrome & Mozilla Firefox with the same defending features.

4. Controlled folder access

Controlled Folder Access is one of the most important feature updates that was released by Microsoft to protect the window user-critical user files and applications and keep it secured from the ever-growing threat of Ransomware. Controlled Folder Access secures the files and folders by notifying the windows users every instance when a program attempts to access those assets. Until the user prompts the permission decision, the access will be blocked. The User Account Control Popup appears as a warning to the users by the Windows as a warning tone and allows them to decide if the access to files and folders are legit and secured.

How to configure Windows Defender Policies using Scalefusion?

The configuration and pushing of various Windows Defender Policies have now been streamlined for IT administrators with the help of Scalefusion windows MDM solution on their managed devices. Let’s explore the step-by-step configuration of Windows Defender Policies using Scalefusion below.

Prerequisites milestone check:

  • Make sure that your device has Windows 10 version 1809 and above since Windows Defender Policies works only on Windows Pro, Business, Enterprise, and Education editions.
  • Your device is enrolled with Scalefusion. If not, please enroll from here first.

Step 1

After enrolling the device, log in to the Scalefusion dashboard. Navigate to the features menu on the left-hand side of the dashboard and click on Device Profiles and policies. 

Step one of Scalefusion Dashboard

Step 2

You can as per the device’s pre-determined settings choose to edit or create an entirely new Windows Device Profile from the Windows Device Profile Section. Now as soon as the Device profiles are set, click on the settings on the upper right-hand side menu bar and click on Windows Defender sections to now configure the Defender Policies.

Step two of Scalefusion Dashboard

Step 3

Now, to configure the Defender Policies, you need to toggle “ON” the configure Defender Policies which will enable you to select the assorted options of setting to navigate as per your requirement. You can also prompt the managed devices and update the users that there is a need to configure the policies from their end.

Step three of Scalefusion Dashboard

Step 4

Now, you will find four baseline options as soon as you toggle the “ON” in the previous step. These options are Basic, Medium, Advanced, and Custom. Out of these policies, you will find the Basic, Medium, and Advanced policies pre-configured in the dashboard which you can reconfigure or select any baseline options upon review and update the profiles with the changes to further enforce them on the managed devices. A custom baseline option is a customizable option among all that you can configure as per your settings framework and standard requirements.

Step four of Scalefusion Dashboard

Step 5

Once you have configured the settings and pre-texts as per your requirements for Windows Defender Policies, now you need to click on the Update Profile button to save the settings determined. Now, all of the changes configured will be automatically pushed to the device profiles you select to implement.

Step five of Scalefusion Dashboard

Closing lines…

Configuring the Windows Defender using Scalefusion MDM can allow the IT admins to secure the devices across the organization with potential malware threats not only on the web but also files and folders present in the windows device. With a range of pre-text customization, the IT admins can configure the settings quickly and push them on the managed devices. This duly demystifies the overburdened IT tasks and reduces the complexity of prevention.

Thousands of businesses rely upon Scalefusion for managing their mobile device, desktops & laptops nand other endpoints

Ayush Maskara is a Jr. Content Writer at Scalefusion/ProMobi Technologies. A media science graduate, a photographer, a fiction author, a storyteller, fiction manuscript editor, and an avid self-help reader, Ayush has been penning the creative wisdom for six years and have stepped into the IT domain for further exploration and staying awake with technological trends across the globe.
Subscribe to our newsletter

Exciting Products.
Cutting-Edge Technology.
Powerful Insights.
Delivered Straight to Your Inbox!

No spam, no BS, unsubscribe at any time.