UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Windows Defender AV must be configured for automatic remediation action to be taken for each threat alert level.


Overview

Finding ID Version Rule ID IA Controls Severity
V-75247 WNDF-AV-000031 SV-89927r2_rule Medium
Description
This policy setting allows you to customize which automatic remediation action will be taken for each threat alert level. Threat alert levels should be added under the Options for this setting. Each entry must be listed as a name value pair. The name defines a threat alert level. The value contains the action ID for the remediation action that should be taken. Valid threat alert levels are: 1 = Low 2 = Medium 4 = High 5 = Severe Valid remediation action values are: 2 = Quarantine 3 = Remove 6 = Ignore
STIG Date
Windows Defender Antivirus Security Technical Implementation Guide 2017-12-27

Details

Check Text ( C-75039r2_chk )
Verify the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Defender Antivirus -> Threats -> "Specify threat alert levels at which default action should not be taken when detected" is set to "Enabled" and "5-2, 4-2, 2-2, 1-2" is entered in the "Show" box option.

Procedure: Use the Windows Registry Editor to navigate to the following key:
HKLM\Software\Policies\Microsoft\Windows Defender\Threats

Criteria: If the value "Threats_ThreatSeverityDefaultAction" is REG_DWORD = 1, this is not a finding.
Fix Text (F-81857r2_fix)
Set the policy value for Computer Configuration -> Administrative Templates -> Windows Components -> Windows Defender Antivirus -> Threats -> "Specify threat alert levels at which default action should not be taken when detected" to "Enabled" and enter "5-2, 4-2, 2-2, 1-2" in the "Show" box option.