Turn on cloud protection in Microsoft Defender Antivirus (2024)

  • Article

Applies to:

  • Microsoft Defender Antivirus
  • Microsoft Defender for Endpoint Plan 1
  • Microsoft Defender for Endpoint Plan 2

Platforms

  • Windows

Cloud protection in Microsoft Defender Antivirus delivers accurate, real-time, and intelligent protection. Cloud protection should be enabled by default.

Note

Tamper protection helps keep cloud protection and other security settings from being changed. As a result, when tamper protection is enabled, any changes made to tamper-protected settings are ignored. If you must make changes to a device and those changes are blocked by tamper protection, we recommend using troubleshooting mode to temporarily disable tamper protection on the device. Note that after troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.

Why cloud protection should be turned on

Microsoft Defender Antivirus cloud protection helps protect against malware on your endpoints and across your network. We recommend keeping cloud protection turned on, because certain security features and capabilities in Microsoft Defender for Endpoint only work when cloud protection is enabled.

The following table summarizes the features and capabilities that depend on cloud protection:

Feature/CapabilitySubscription requirementDescription
Checking against metadata in the cloud. The Microsoft Defender Antivirus cloud service uses machine learning models as an extra layer of defense. These machine learning models include metadata, so when a suspicious or malicious file is detected, its metadata is checked.

To learn more, see Blog: Get to know the advanced technologies at the core of Microsoft Defender for Endpoint next-generation protection

Microsoft Defender for Endpoint Plan 1 or Plan 2 (Standalone or included in a plan like Microsoft 365 E3 or E5)
Cloud protection and sample submission. Files and executables can be sent to the Microsoft Defender Antivirus cloud service for detonation and analysis. Automatic sample submission relies on cloud protection, although it can also be configured as a standalone setting.

To learn more, see Cloud protection and sample submission in Microsoft Defender Antivirus.

Microsoft Defender for Endpoint Plan 1 or Plan 2 (Standalone or included in a plan like Microsoft 365 E3 or E5)
Tamper protection. Tamper protection helps protect against unwanted changes to your organization's security settings.

To learn more, see Protect security settings with tamper protection.

Microsoft Defender for Endpoint Plan 2 (Standalone or included in a plan like Microsoft 365 E5)
Block at first sight
Block at first sight detects new malware and blocks it within seconds. When a suspicious or malicious file is detected, block at first sight capabilities queries the cloud protection backend and applies heuristics, machine learning, and automated analysis of the file to determine whether it is a threat.

To learn more, see What is "block at first sight"?

Microsoft Defender for Endpoint Plan 1 or Plan 2 (Standalone or included in a plan like Microsoft 365 E3 or E5)
Emergency signature updates. When malicious content is detected, emergency signature updates and fixes are deployed. Rather than wait for the next regular update, you can receive these fixes and updates within minutes.

To learn more about updates, see Microsoft Defender Antivirus security intelligence and product updates.

Microsoft Defender for Endpoint Plan 2 (Standalone or included in a plan like Microsoft 365 E5)
Endpoint detection and response (EDR) in block mode. EDR in block mode provides extra protection when Microsoft Defender Antivirus isn't the primary antivirus product on a device. EDR in block mode remediates artifacts found during EDR-generated scans that the non-Microsoft, primary antivirus solution might have missed. When enabled for devices with Microsoft Defender Antivirus as the primary antivirus solution, EDR in block mode provides the added benefit of automatically remediating artifacts identified during EDR-generated scans.

To learn more, see EDR in block mode.

Microsoft Defender for Endpoint Plan 2 (Standalone or included in a plan like Microsoft 365 E5)
Attack surface reduction rules. ASR rules are intelligent rules that you can configure to help stop malware. Certain rules require cloud protection to be turned on in order to function fully. These rules include:
- Block executable files from running unless they meet a prevalence, age, or trusted list criteria
- Use advanced protection against ransomware
- Block untrusted programs from running from removable drives

To learn more, see Use attack surface reduction rules to prevent malware infection.

Microsoft Defender for Endpoint Plan 1 or Plan 2 (Standalone or included in a plan like Microsoft 365 E3 or E5)
Indicators of compromise (IoCs). In Defender for Endpoint, IoCs can be configured to define the detection, prevention, and exclusion of entities. Examples:
"Allow" indicators can be used to define exceptions to antivirus scans and remediation actions.
"Alert and block" indicators can be used to prevent files or processes from executing.

To learn more, see Create indicators.

Microsoft Defender for Endpoint Plan 2 (Standalone or included in a plan like Microsoft 365 E5)

Methods to configure cloud protection

You can turn Microsoft Defender Antivirus cloud protection on or off by using one of several methods, such as:

  • Microsoft Intune
  • Group Policy
  • PowerShell cmdlets
  • Windows Management Instruction (WMI)

You can also use Configuration Manager. And, you can turn cloud protection on or off on individual endpoints by using the Windows Security app.

For more information about the specific network-connectivity requirements to ensure your endpoints can connect to the cloud protection service, see Configure and validate network connections.

Note

In Windows 10 and Windows 11, there is no difference between the Basic and Advanced reporting options described in this article. This is a legacy distinction and choosing either setting results in the same level of cloud protection. There is no difference in the type or amount of information that is shared. For more information on what we collect, see the Microsoft Privacy Statement.

Use Microsoft Intune to turn on cloud protection

  1. Go to the Intune admin center (https://intune.microsoft.com) and sign in.

  2. Choose Endpoint security > Antivirus.

  3. In the AV policies section, either select an existing policy, or choose + Create Policy.

    TaskSteps
    Create a new policy1. For Platform, select Windows 10, Windows 11, and Windows Server.

    2. For Profile, select Microsoft Defender Antivirus.

    3. On the Basics page, specify a name and description for the policy, and then choose Next.

    4. In the Defender section, find Allow Cloud Protection, and set it to Allowed. Then choose Next.

    5. Scroll down to Submit Samples Consent, and select one of the following settings:
    - Send all samples automatically
    - Send safe samples automatically

    6. On the Scope tags step, if your organization is using scope tags, select the tags you want to use, and then choose Next.

    7. On the Assignments step, select the groups, users, or devices that you want to apply this policy to, and then choose Next.

    8. On the Review + create step, review the settings for your policy, and then choose Create.

    Edit an existing policy1. Select the policy that you want to edit.

    2. Under Configuration settings, choose Edit.

    3. In the Defender section, find Allow Cloud Protection, and set it to Allowed.

    4. Scroll down to Submit Samples Consent, and select one of the following settings:
    - Send all samples automatically
    - Send safe samples automatically

    5. Select Review + save.

Tip

To learn more about Microsoft Defender Antivirus settings in Intune, see Antivirus policy for endpoint security in Intune.

Use Group Policy to turn on cloud protection

  1. On your Group Policy management device, open the Group Policy Management Console, right-click the Group Policy Object you want to configure and select Edit.

  2. In the Group Policy Management Editor, go to Computer configuration.

  3. Select Administrative templates.

  4. Expand the tree to Windows components > Microsoft Defender Antivirus > MAPS

    Note

    MAPS settings are equal to cloud-delivered protection.

  5. Double-click Join Microsoft MAPS. Ensure the option is turned on and set to Basic MAPS or Advanced MAPS. Select OK.

    You can choose to send basic or additional information about detected software:

    • Basic MAPS: Basic membership sends basic information to Microsoft about malware and potentially unwanted software that has been detected on your device. Information includes where the software came from (like URLs and partial paths), the actions taken to resolve the threat, and whether the actions were successful.

    • Advanced MAPS: In addition to basic information, advanced membership sends detailed information about malware and potentially unwanted software, including the full path to the software, and detailed information about how the software has affected your device.

  6. Double-click Send file samples when further analysis is required. Ensure that the first option is set to Enabled and that the other options are set to either:

    • Send safe samples (1)
    • Send all samples (3)

    Note

    The Send safe samples (1) option means that most samples are sent automatically. Files that are likely to contain personal information prompt the user for additional confirmation.Setting the option to Always Prompt (0) lowers the protection state of the device. Setting it to Never send (2) means that the Block at First Sight feature of Microsoft Defender for Endpoint won't work.

  7. Select OK.

Use PowerShell cmdlets to turn on cloud protection

The following cmdlets can turn on cloud protection:

Set-MpPreference -MAPSReporting AdvancedSet-MpPreference -SubmitSamplesConsent SendAllSamples

For more information on how to use PowerShell with Microsoft Defender Antivirus, see Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus and Microsoft Defender Antivirus cmdlets. Policy CSP - Defender also has more information specifically on -SubmitSamplesConsent.

Important

You can set -SubmitSamplesConsent to SendSafeSamples (the default, recommended setting), NeverSend, or AlwaysPrompt.The SendSafeSamples setting means that most samples are sent automatically. Files that are likely to contain personal information result in a prompt for the user to continue, and require confirmation.The NeverSend and AlwaysPrompt settings lower the protection level of the device. Furthermore, the NeverSend setting means that the Block at First Sight feature of Microsoft Defender for Endpoint won't work.

Use Windows Management Instruction (WMI) to turn on cloud protection

Use the Set method of the MSFT_MpPreference class for the following properties:

MAPSReportingSubmitSamplesConsent

For more information about allowed parameters, see Windows Defender WMIv2 APIs

Turn on cloud protection on individual clients with the Windows Security app

Note

If the Configure local setting override for reporting Microsoft MAPS Group Policy setting is set to Disabled, then the Cloud-based protection setting in Windows Settings are greyed out and unavailable. Changes made through a Group Policy Object must first be deployed to individual endpoints before the setting is updated in Windows Settings.

  1. Open the Windows Security app by selecting the shield icon in the task bar, or by searching the start menu for Windows Security.

  2. Select the Virus & threat protection tile (or the shield icon on the left menu bar), and then, under Virus & threat protection settings, select Manage settings.

  3. Confirm that Cloud-based Protection and Automatic sample submission are switched to On.

    Note

    If automatic sample submission has been configured with Group Policy, then the setting is greyed out and unavailable.

See also

  • Use Microsoft cloud protection in Microsoft Defender Antivirus

  • Configuration Manager: Microsoft Defender for Endpoint

  • Use PowerShell cmdlets to manage Microsoft Defender Antivirus

Tip

If you're looking for Antivirus related information for other platforms, see:

  • Set preferences for Microsoft Defender for Endpoint on macOS
  • Microsoft Defender for Endpoint on Mac
  • macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune
  • Set preferences for Microsoft Defender for Endpoint on Linux
  • Microsoft Defender for Endpoint on Linux
  • Configure Defender for Endpoint on Android features
  • Configure Microsoft Defender for Endpoint on iOS features

Tip

Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender for Endpoint Tech Community.

Turn on cloud protection in Microsoft Defender Antivirus (2024)

FAQs

Turn on cloud protection in Microsoft Defender Antivirus? ›

Under Configuration settings, choose Edit. 3. In the Defender section, find Allow Cloud Protection, and set it to Allowed.

Should cloud protection be on or off Windows Defender? ›

Cloud protection works together with Microsoft Defender Antivirus to deliver accurate, real-time, and intelligent protection. We recommend keeping cloud protection turned on.

Should you turn on Microsoft Defender Antivirus? ›

It's important to have Microsoft Defender Firewall on, even if you already have another firewall on. It helps protect you from unauthorized access.

How do I enable defender for cloud endpoint protection? ›

From Defender for Cloud's menu, select Environment settings and select the subscription with the machines that you want to receive Defender for Endpoint. In the status of the Endpoint protection component, select On to enable the integration with Microsoft Defender for Endpoint.

Does Windows Defender offer Cloud protection? ›

Threat Protection: Microsoft Defender for Cloud provides advanced threat protection capabilities that use AI and machine learning to identify and block potential threats in real-time. It detects and blocks malware, phishing attacks, and other forms of cyber threats before they can do any harm to your cloud environment.

What is Microsoft Defender for cloud protects? ›

Help protect multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime.

What is the difference between Microsoft 365 Defender and Defender for Cloud? ›

Then, Defender for Office 365 protects your Microsoft 365 data (Exchange mailboxes, SharePoint sites and Teams...), Defender for Identity protects your onsite Active Directory and Defender for Cloud Apps help track and protect your users when navigating the Internet.

What is the difference between Defender for Cloud and 365 Defender? ›

Defender for Cloud focuses specifically on securing the cloud infrastructure, while Microsoft 365 Defender Suite offers a comprehensive suite of security components, including email protection, endpoint security, identity protection, and cloud app security.

Is it safe to only have Windows Defender? ›

Is Microsoft Defender enough for Windows? Yes, Microsoft Defender is a good antivirus for basic protection against malware. A reliable third-party antivirus, like TotalAV, will offer much better security features that Windows Defender doesn't have.

Do I need McAfee if I have Windows Defender? ›

Do you need additional antivirus software? With built-in coverage, you may wonder if you should invest in paid antivirus software. The answer is, of course, yes! It can be a good idea to get another antivirus solution because blocking malware and viruses should just be one part of your threat protection.

What is the difference between Windows Defender and Microsoft Defender? ›

Windows Defender is the desktop security client default for Microsoft Windows OS and other OSes. Microsoft Defender is a broader suite of security tools that includes Windows Defender for Endpoint (a variant of Windows Defender) that is used for enterprise security particularly for Microsoft 365 licensees.

How do I know if defender for cloud is enabled? ›

To check, go to Environment settings on the Defender for Cloud left menu, select the connector, and then select Settings. If no standards are assigned, select the three dots to check if you have permissions to assign standards.

What is the difference between defender for cloud and defender for endpoint? ›

In summary, Microsoft Defender for Cloud focuses on securing cloud workloads, Defender for Servers provides endpoint protection for servers, Defender for Endpoint offers advanced threat protection and EDR capabilities for various endpoints, and Windows Defender Antivirus is a basic antivirus solution included with ...

Is Microsoft Defender for cloud enabled by default? ›

Microsoft Defender for Cloud is enabled with your Microsoft Azure subscription and accessed from the Azure portal.

Is Cloud-delivered protection enabled? ›

Cloud-delivered protection is enabled by default, however you may need to re-enable it if it has been disabled as part of previous organizational policies. For more information, see Enable cloud-delivered protection in Microsoft Defender Antivirus.

How do I select Cloud protection level in defender? ›

Use Group Policy to specify the level of cloud protection

In the Group Policy Management Editor, go to Computer Configuration > Administrative templates. Expand the tree to Windows Components > Microsoft Defender Antivirus > MpEngine. Double-click the Select cloud protection level setting, and set it to Enabled.

Top Articles
Latest Posts
Article information

Author: Msgr. Refugio Daniel

Last Updated:

Views: 6226

Rating: 4.3 / 5 (54 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Msgr. Refugio Daniel

Birthday: 1999-09-15

Address: 8416 Beatty Center, Derekfort, VA 72092-0500

Phone: +6838967160603

Job: Mining Executive

Hobby: Woodworking, Knitting, Fishing, Coffee roasting, Kayaking, Horseback riding, Kite flying

Introduction: My name is Msgr. Refugio Daniel, I am a fine, precious, encouraging, calm, glamorous, vivacious, friendly person who loves writing and wants to share my knowledge and understanding with you.