

To prevent Cryptojacking attack occurred when an attacker hijacks a victims computer to freely run mining for Cryptocurrency without owner's permission, m ake sure you configure Defender AV policy with "detection for Potentially Unwanted Application" (PUA) to block mode.Make different Endpoint Configuration Manager AV policies for different device types and deploy the related policies to the corresponding collections, SQL Server Collection, IIS Server Collection, Restricted Workstation Collection, Standard Workstation CollectionĮxample of AV Policies for different Servers and Workstation types:.You may wonder what is the best Scan types for your daily scheduled scan on all systems, the Full Scan is for investigation of virus attack on the system, for the weekly or daily scheduled scan, it should be good and sufficient with quick scan.We discuss about Microsoft Defender for Endpoint Antivirus Configuration, Policy and exclusion list in detail to avoid making the common mistakes and to apply the best practice to it.
