It's great to see @microsoft implementing protection for #windowsdefender as I've been seeing some attacks going after Defender and disabling it. Many products offer such features, like @Webroot and @Sophos. https://t.co/9UK1RjFnee
— Jimmy T. (@TecSecOps) October 14, 2019
Using Windows 10 and not using Tamper Protection? Make sure to enable it and keep it enabled. There is only upside and no downside.
— BleepingComputer (@BleepinComputer) October 14, 2019
Why use it you may ask? Well, it would prevent the following types of attacks.#Windows10 @WindowsATP @msftsecurity
Not sure if this applies to SCCM, but it can't work with GPO, at least, because of the way GPOs work. That is, a GPO is doing basically the same thing that a script could do, which means there's no guarantee that protection isn't being disabled by a malicious script.
— Jason Freeman (@el_jasoon) October 14, 2019
But, I am guessing SCCM does something that's above and beyond this, so maybe this doesn't apply.
— Jason Freeman (@el_jasoon) October 14, 2019
Kind of wish we could get a GPOv2 where this wouldn't apply, too.
Tamper protection now generally available for Microsoft Defender ATP customers.
— Tanmay Ganacharya (@tanmayg) October 14, 2019
Tamper protection prevents unwanted changes to security settings on devices. With this protection in place, customers can mitigate threats that attempt to disable security protection features. pic.twitter.com/ipcNGcZopE
Microsoft enables Tamper Protection on Windows 10 for all Home users https://t.co/RSLSd8oyyS pic.twitter.com/qarlkKP4rZ
— Eric Vanderburg (@evanderburg) October 14, 2019
Any plans to Enable this via #ConfigMgr#SCCM @djammmerhttps://t.co/BuFnQ14SAS
— Adam Juelich (@acjuelich) October 14, 2019
Tamper protection can be deployed and managed centrally – and securely – through Microsoft Intune, similar to how other endpoint security settings are managed. pic.twitter.com/dk22caBLCB
— Tanmay Ganacharya (@tanmayg) October 14, 2019
TrickBot was found to be using the Set-MpPreference PowerShell command to disable various protection settings in Windows Defender. The Windows 10 Tamper Protection feature would prevent this.https://t.co/XPEO5nvJeg
— BleepingComputer (@BleepinComputer) October 14, 2019
GootKit was discovered to be adding exclusions to the folder path where the malware was located. Once again, Tamper Protection would prevent this.https://t.co/f5bJo3Wi6h
— BleepingComputer (@BleepinComputer) October 14, 2019
Novter/Nodersok was found to be manually creating various group policies to disable Windows Defender's real-time protection. Tamper Protection would also prevent this.https://t.co/sqxh7eUyYg
— BleepingComputer (@BleepinComputer) October 14, 2019
Microsoft rolls out Windows Tamper Protection for Windows antivirus to keep hackers at bay https://t.co/ay34zdY7j2
— TNW (@thenextweb) October 15, 2019
Microsoft rolls out Windows Tamper Protection for Windows antivirus to keep hackers at bay https://t.co/W8yCcAdYS6
— TNW (@thenextweb) October 15, 2019
Microsoft rolls out Windows Tamper Protection for Windows antivirus to keep hackers at bay https://t.co/XMeKO14Iso
— TNW (@thenextweb) October 15, 2019
Tamper protection is now generally available for Microsoft Defender ATP customers! https://t.co/XrSCJ5Eomr pic.twitter.com/6uHkzLTKdK
— Tech Community (@MSTCommunity) October 15, 2019
??
— Mayunk Jain ? #MSIgnite T-3 weeks (@mayunkj) October 15, 2019
Changes to Microsoft Defender @WindowsATP tamper protection state may only be made through @MSIntune, not through any other methods like group policy, registry key, or WMI
??
? Tamper protection now available in @Microsoft365 https://t.co/7exnzU5rfw pic.twitter.com/wcZs0Zrpec
Tamper protection for #Microsoft Defender ATP via #Intune now GA. This prevents unauthorized changes to corp policy, but also goes further & alerts on suspicious attempts. I love that our blog has user testimonials to show how we've built it together! https://t.co/Z72EtjrBsx
— Amitai Rottem (@AmitaiTechie) October 14, 2019
Tamper protection is now available for #MicrosoftDefenderATP--and can be enabled via @MSIntune. Check it out: https://t.co/RBnoG5umkF pic.twitter.com/spY8PuNMGk
— Windows IT Pro (@MSWindowsITPro) October 14, 2019
✔we are excited to announce that tamper protection is now generally available! ? https://t.co/dAxPTfOGzV #cybersecurity #mdatp #defender
— Heike Ritter (@HeikeRitter) October 14, 2019
Defender ATP tamper protection prevents unwanted changes to security settings on devices either by local admins or by malicious applications.https://t.co/QXGB48Llhb
— Adam Hall ?? (@adhall_msft) October 14, 2019
Tamper protection now generally available for Microsoft Defender ATP customers#Security #MDATP #Windows10 #Defender #Microsofthttps://t.co/ApV2GdYmBm
— Oliver Kieselbach (@okieselb) October 14, 2019
Tamper protection now generally available for Microsoft Defender ATP customers https://t.co/CFvHl9XZ8A
— Ari Auvinen (@arkka1) October 14, 2019
Microsoft Defender 'Tamper Protection' reaches general availability
— Catalin Cimpanu (@campuscodi) October 14, 2019
-Now available for home users
-Feature to be enabled by default for everyone
-You can enable it right now, though, if you don't want to waithttps://t.co/J6ZdWHPghU pic.twitter.com/FqZ8iN8VpH
Microsoft Defender 'Tamper Protection,' which prevents malware from disabling Windows Defender features, is now generally available: https://t.co/0ZYYwMsSJS (by ZDNet's @campuscodi)
— Mary Jo Foley (@maryjofoley) October 14, 2019
Microsoft Defender 'Tamper Protection' reaches general availability https://t.co/JMD0txmJoZ by @campuscodi
— ZDNet (@ZDNet) October 14, 2019