The Redmond-based tech giant is encouraging all users to activate Tamper Protection in Microsoft Defender. This Tamper Protection has a number of features designed to protect us from ransomware, and it all comes for free as part of Windows 11.

Microsoft offers its users more security features

Microsoft officials recommend using this new feature to stop third parties from tampering with your security settings, particularly during installs. This comes as part of the final version of the company’s security configuration. As you would imagine, this recommendation is mainly for businesses that are transferring to Windows 11, but everyone should consider taking this extra safety precaution. The feature was originally released in 2019 and is available for Windows 10 and Windows Server versions 2022, 2019, and 2016. In the official Microsoft post, it says that Tamper Protection will lock down the default settings for Microsoft Defender and make sure they are not changed during the installation process. These settings include:

Disabling virus and threat protection Disabling real-time protection Turning off behavior monitoring Disabling antivirus Disabling cloud-delivered protection Removing security intelligence updates

Tampering attempts are usually signs of much larger cyberattacks. Malicious third parties could try to change security settings as a way to persist and stay undetected. If you’re part of your organization’s security team, you can view information about such attempts, and then take appropriate actions to mitigate threats. When a tampering attempt is detected, an alert is raised in the Microsoft 365 Defender portal. Using endpoint detection and response, as well as advanced hunting capabilities in Microsoft Defender for Endpoint, your security operations team can investigate and address such attempts.

How do I turn it on on/off in the Microsoft 365 Defender portal

Have you already enabled your Tamper protection feature? How useful do you find this new security solution? Share your opinion with us in the comments section below.

Name * Email * Commenting as . Not you? Save information for future comments
Comment

Δ