UCF STIG Viewer Logo

Microsoft Defender AV must be configured to not exclude files for scanning.


Overview

Finding ID Version Rule ID IA Controls Severity
V-213429 WNDF-AV-000005 SV-213429r823030_rule Medium
Description
This policy setting allows disabling of scheduled and real-time scanning for files under the paths specified or for the fully qualified resources specified. Paths should be added under the Options for this setting. Each entry must be listed as a name value pair where the name should be a string representation of a path or a fully qualified resource name. As an example, a path might be defined as: "c:\Windows" to exclude all files in this directory. A fully qualified resource name might be defined as: "C:\Windows\App.exe". The value is not used and it is recommended that this be set to 0. Exceptions can be made to allow file/folders that are impacting enterprise applications to be excluded from being scanned. All exclusions should be documented and approved.
STIG Date
Microsoft Defender Antivirus Security Technical Implementation Guide 2022-04-08

Details

Check Text ( C-14654r820134_chk )
Verify the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Exclusions >> "Path Exclusions" is set to "Disabled" or "Not Configured.

Procedure: Use the Windows Registry Editor to navigate to the following key:
HKLM\Software\Policies\Microsoft\Windows Defender\Exclusions

Criteria: If the value "Exclusions_Paths" does not exist, this is not a finding.
Fix Text (F-14652r823029_fix)
Set the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Microsoft Defender Antivirus >> Exclusions >> "Path Exclusions" to "Disabled" or "Not Configured".