%3CLINGO-SUB%20id%3D%22lingo-sub-1183258%22%20slang%3D%22en-US%22%3ERe%3A%20Enable%20tamper%20protection%20in%20Threat%20%26amp%3B%20Vulnerability%20Management%20to%20increase%20your%20security%20post%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1183258%22%20slang%3D%22en-US%22%3E%3CP%3EWhat%20is%20the%20reason%20behind%20GPO%20not%20being%20supported%20to%20control%20tampering%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1186130%22%20slang%3D%22en-US%22%3ERe%3A%20Enable%20tamper%20protection%20in%20Threat%20%26amp%3B%20Vulnerability%20Management%20to%20increase%20your%20security%20post%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1186130%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F134719%22%20target%3D%22_blank%22%3E%40Bj%C3%B6rn%20Lagerwall%3C%2FA%3E%20-%20we%20would%20not%20expose%20GPO%20or%20any%20settings%20that%20can%20be%20used%20to%20alter%20Tamper%20Protection%20on%20device%20by%20admin%20or%20apps%20or%20malware%26nbsp%3B%20having%20admin%20privilege.%20With%20that%20said%20if%20you%20use%20GPO%20to%20manage%20your%20device%20through%20ConfigMgr%2C%20we%20are%20planning%20to%20support%20such%20devices%20from%20MEM%20(Microsoft%20Endpoint%20Manager).%20Stay%20tuned%20for%20our%20next%20update...%26nbsp%3B%3CIMG%20class%3D%22lia-deferred-image%20lia-image-emoji%22%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Fhtml%2Fimages%2Femoticons%2Fsmile_40x40.gif%22%20alt%3D%22%3Asmile%3A%22%20title%3D%22%3Asmile%3A%22%20%2F%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1187377%22%20slang%3D%22en-US%22%3ERe%3A%20Enable%20tamper%20protection%20in%20Threat%20%26amp%3B%20Vulnerability%20Management%20to%20increase%20your%20security%20post%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1187377%22%20slang%3D%22en-US%22%3E%3CP%3EThis%20is%20only%20available%20for%201903%20and%20up%3F%20%3A(%3C%2Fimg%3E%20we%20have%201809s%20mostly%20right%20now..%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1192288%22%20slang%3D%22en-US%22%3ERe%3A%20Enable%20tamper%20protection%20in%20Threat%20%26amp%3B%20Vulnerability%20Management%20to%20increase%20your%20security%20post%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1192288%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F278666%22%20target%3D%22_blank%22%3E%40rockypabillore%3C%2FA%3E%26nbsp%3B%26nbsp%3B-%20this%20is%20available%20for%26nbsp%3BWindows%20versions%201709%2C%201803%2C%201809%20and%201903%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1201658%22%20slang%3D%22en-US%22%3ERe%3A%20Enable%20tamper%20protection%20in%20Threat%20%26amp%3B%20Vulnerability%20Management%20to%20increase%20your%20security%20post%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1201658%22%20slang%3D%22en-US%22%3E%3CP%3Ewhat%20about%20for%20older%20Windows%2010%20versions%20like%201703%20%26amp%3B%201607%20%26amp%3B%20maybe%20LTSB%202016%2C%20Kasia%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1182920%22%20slang%3D%22en-US%22%3EEnable%20tamper%20protection%20in%20Threat%20%26amp%3B%20Vulnerability%20Management%20to%20increase%20your%20security%20posture%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1182920%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20are%20happy%20to%20announce%20that%20tamper%20protection%20is%20now%20supported%20in%20Microsoft%20Defender%20ATP%20Threat%20%26amp%3B%20Vulnerability%20Management%20to%20help%20raise%20your%20organization%E2%80%99s%20security%20posture.%20%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENow%2C%20within%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Ftvm-security-recommendation%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Esecurity%20recommendations%3C%2FA%3E%20section%20of%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fnext-gen-threat-and-vuln-mgt%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EThreat%20%26amp%3B%20Vulnerability%20Management%3C%2FA%3E%20(TVM)%2C%20SecOps%20and%20security%20administrators%20can%20see%20a%20recommendation%20to%20turn%20on%20tamper%20protection%20and%20then%20be%20able%20to%20learn%20more%20about%20the%20recommendation%20and%20act%20on%20it.%26nbsp%3BThis%20provides%20security%20teams%20greater%20visibility%20into%20how%20many%20machines%20don%E2%80%99t%20have%20this%20feature%20turned%20on%2C%20the%20ability%20to%20monitor%20changes%20over%20time%2C%20and%20a%20process%20to%20turn%20on%20the%20feature.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETamper%20protection%20keeps%20threat%20actors%20from%20disabling%20the%20very%20security%20protection%20features%20that%20work%20to%20stop%20them%20from%20entering%20your%20unsuspecting%20network.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1409009796%22%20id%3D%22toc-hId--1409009796%22%3E%3CFONT%20size%3D%225%22%3EShields%20up%20on%20malicious%20and%20unauthorized%20security%20changes%3C%2FFONT%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20see%20tamper%20protection%20status%20from%20within%20TVM%2C%20go%20to%20the%20security%20recommendations%20page%20and%20search%20for%20%3CEM%3Etamper%3C%2FEM%3E%2C%20as%20shown%20in%20the%20following%20image%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22TVM.png%22%20style%3D%22width%3A%20977px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F172077iDE64065F28D0D5FF%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22TVM.png%22%20alt%3D%22TVM.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorShweta%20Jha_0%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3EIn%20the%20list%20of%20results%2C%20you%20can%20select%20%3CSTRONG%3ETurn%20on%20Tamper%20Protection%3C%2FSTRONG%3E.%20It%20opens%20up%20a%20flyout%20screen%20so%20you%20can%20learn%20more%20about%20it%20and%20%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3Eturn%20it%20on%3C%2FFONT%3E.%20You%20can%20see%20export%20option%20from%20the%20flyout%20screen%20to%20get%20the%20exposed%20device%20list.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Flyover.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F172085i9EAB8EDAE05BD3AC%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Flyover.png%22%20alt%3D%22Flyover.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1078503037%22%20id%3D%22toc-hId-1078503037%22%3E%3CFONT%20size%3D%225%22%3EAvailability%20in%20previous%20Windows%2010%20versions%3C%2FFONT%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETamper%20protection%20is%20now%20also%20available%20in%20earlier%20versions%20of%20Windows%2010.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20understand%20each%20organization%E2%80%99s%20environment%20is%20unique%2C%20with%20different%20needs%2C%20requirements%2C%20and%20therefore%20different%20timelines%20for%20planning%2C%20testing%2C%20and%20deploying%20Windows%20updates.%20We%20also%20know%20that%20our%20customers%20want%20to%20have%20the%20latest%20security%20features%20on%20the%20versions%20of%20Windows%20that%20are%20currently%20in%20their%20organizations.%20We%20listened%20to%20this%20customer%20feedback%20and%20are%20excited%20to%20be%20backporting%20this%20latest%20feature.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EYou%20can%20continue%20to%20enable%20tamper%20protection%20from%20Microsoft%20Intune%20based%20on%20user%20or%20device%20groups.%20Go%20to%20%3CSTRONG%3E%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3EMicrosoft%20Endpoint%20Manager%20%3C%2FFONT%3E%3C%2FSTRONG%3E%26gt%3B%20%3CSTRONG%3EDevice%20Configuration%20%E2%80%93%20Profiles%3C%2FSTRONG%3E%20%26gt%3B%20%3CSTRONG%3ECreate%20profile%3C%2FSTRONG%3E%20%26gt%3B%20%3CSTRONG%3EEndpoint%20protection%3C%2FSTRONG%3E%20and%20configure%20tamper%20protection%20as%20shown%20in%20the%20following%20image%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Intune.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F172081i5B5974876F2FE09A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22Intune.png%22%20alt%3D%22Intune.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorShweta%20Jha_2%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3EOnce%20tamper%20protection%20is%20enabled%20by%20administrators%2C%20customers%20with%20Windows%20versions%201709%2C%201803%2C%201809%20and%201903%20can%20use%20PowerShell%20to%20confirm%20tamper%20protection%20is%20turned%20on%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EOpen%20the%20Windows%20PowerShell%20app%20in%20administrator%20mode%3C%2FLI%3E%0A%3CLI%3EUse%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fpowershell%2Fmodule%2Fdefender%2Fget-mpcomputerstatus%3Fview%3Dwin10-ps%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSTRONG%3EGet-MpComputerStatus%3C%2FSTRONG%3E%3C%2FA%3E%20PowerShell%20cmdlet.%3C%2FLI%3E%0A%3CLI%3EIn%20the%20list%20of%20results%2C%20look%20for%20%3CSTRONG%3EIsTamperProtected%3C%2FSTRONG%3E.%20(A%20value%20of%20%3CEM%3Etrue%3C%2FEM%3E%20means%20tamper%20protection%20is%20enabled.)%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3EThose%20customers%20with%20Windows%2010%20version%201903%20can%20also%20see%20that%20protection%20is%20turned%20on%20in%20the%20Windows%20Security%20app%3A%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorShweta%20Jha_3%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22LocalUX.png%22%20style%3D%22width%3A%20590px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F172084iDB6F361D57BEA710%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22LocalUX.png%22%20alt%3D%22LocalUX.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--728951426%22%20id%3D%22toc-hId--728951426%22%3E%3CFONT%20size%3D%225%22%3ELet%20us%20know%20what%20you%20think%3C%2FFONT%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETurn%20tamper%20protection%20on%20in%20your%20environment%20and%20give%20us%20your%20feedback.%20You%20can%20use%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fwindows%2Fsecurity%2Fthreat-protection%2Fmicrosoft-defender-atp%2Fnext-gen-threat-and-vuln-mgt%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EThreat%20%26amp%3B%20Vulnerability%20Management%3C%2FA%3E%20to%20get%20the%20latest%20security%20recommendations%20and%20insights.%20Stay%20tuned!%20More%20exciting%20enhancements%20are%20coming%20up.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1758561407%22%20id%3D%22toc-hId-1758561407%22%3E%3CFONT%20size%3D%225%22%3ELearn%20more%3C%2FFONT%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-antivirus%2Fprevent-changes-to-security-settings-with-tamper-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EProtect%20security%20settings%20with%20tamper%20protection.%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWant%20to%20experience%20Microsoft%20Defender%20ATP%3F%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fmicrosoft-365%2Fwindows%2Fmicrosoft-defender-atp%3Focid%3Ddocs-wdatp-portaloverview-abovefoldlink%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESign%20up%20for%20a%20free%20trial.%3C%2FA%3E%20Microsoft%20Defender%20ATP%20is%20part%20of%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Ftechnology%2Fthreat-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Threat%20Protection%3C%2FA%3E%20solutions%20which%20provides%20unified%20protection%20for%20identities%2C%20endpoints%2C%20email%20and%20data%2C%20apps%2C%20and%20infrastructure.%20Through%20signal%20sharing%20across%20Microsoft%20services%2C%20customers%20can%20count%20on%20Microsoft%E2%80%99s%20industry-leading%20optics%20and%20security%20technologies%20for%20combating%20today%E2%80%99s%20threats.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CEM%3EShweta%20Jha%3C%2FEM%3E%3C%2FSTRONG%3E%3CEM%3E%20(%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Ftwitter.com%2F%40shwetajha_MS%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%40shwetajha_MS%3C%2FA%3E%3CEM%3E)%3C%2FEM%3E%3CBR%20%2F%3E%3CEM%3EMicrosoft%20Defender%20ATP%20team%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1182920%22%20slang%3D%22en-US%22%3E%3CP%3E%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3ENow%2C%20within%20the%20security%20recommendations%20section%20of%20Threat%20%26amp%3B%20Vulnerability%20Management%20(TVM)%2C%20SecOps%20and%20security%20administrators%20can%20see%20a%20recommendation%20to%20turn%20on%20tamper%20protection%20and%20then%20be%20able%20to%20learn%20more%20about%20the%20recommendation%20and%20act%20on%20it.%26nbsp%3B%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%3CFONT%20style%3D%22background-color%3A%20%23ffffff%3B%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22tamper-protection-in-TVM%20-%20thumb.png%22%20style%3D%22width%3A%20480px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F172090iA8261C47989A242A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22tamper-protection-in-TVM%20-%20thumb.png%22%20alt%3D%22tamper-protection-in-TVM%20-%20thumb.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FFONT%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1182920%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EThreat%20%26amp%3B%20Vulnerability%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

We are happy to announce that tamper protection is now supported in Microsoft Defender ATP Threat & Vulnerability Management to help raise your organization’s security posture.  

 

Now, within the security recommendations section of Threat & Vulnerability Management (TVM), SecOps and security administrators can see a recommendation to turn on tamper protection and then be able to learn more about the recommendation and act on it. This provides security teams greater visibility into how many machines don’t have this feature turned on, the ability to monitor changes over time, and a process to turn on the feature.

 

Tamper protection keeps threat actors from disabling the very security protection features that work to stop them from entering your unsuspecting network.

 

Shields up on malicious and unauthorized security changes

 

To see tamper protection status from within TVM, go to the security recommendations page and search for tamper, as shown in the following image:

 

TVM.png

 

In the list of results, you can select Turn on Tamper Protection. It opens up a flyout screen so you can learn more about it and turn it on. You can see export option from the flyout screen to get the exposed device list.

 

Flyover.png

 

Availability in previous Windows 10 versions

 

Tamper protection is now also available in earlier versions of Windows 10.

 

We understand each organization’s environment is unique, with different needs, requirements, and therefore different timelines for planning, testing, and deploying Windows updates. We also know that our customers want to have the latest security features on the versions of Windows that are currently in their organizations. We listened to this customer feedback and are excited to be backporting this latest feature.

 

You can continue to enable tamper protection from Microsoft Intune based on user or device groups. Go to Microsoft Endpoint Manager > Device Configuration – Profiles > Create profile > Endpoint protection and configure tamper protection as shown in the following image:

 

Intune.png

 

Once tamper protection is enabled by administrators, customers with Windows versions 1709, 1803, 1809 and 1903 can use PowerShell to confirm tamper protection is turned on:

  1. Open the Windows PowerShell app in administrator mode
  2. Use the Get-MpComputerStatus PowerShell cmdlet.
  3. In the list of results, look for IsTamperProtected. (A value of true means tamper protection is enabled.)

Those customers with Windows 10 version 1903 can also see that protection is turned on in the Windows Security app:

 

LocalUX.png

 

Let us know what you think

 

Turn tamper protection on in your environment and give us your feedback. You can use Threat & Vulnerability Management to get the latest security recommendations and insights. Stay tuned! More exciting enhancements are coming up.

 

Learn more

 

Protect security settings with tamper protection.

 

Want to experience Microsoft Defender ATP? Sign up for a free trial. Microsoft Defender ATP is part of the Microsoft Threat Protection solutions which provides unified protection for identities, endpoints, email and data, apps, and infrastructure. Through signal sharing across Microsoft services, customers can count on Microsoft’s industry-leading optics and security technologies for combating today’s threats.

 

Shweta Jha (@shwetajha_MS)
Microsoft Defender ATP team

5 Comments
Occasional Contributor

What is the reason behind GPO not being supported to control tampering?

Microsoft

@Björn Lagerwall - we would not expose GPO or any settings that can be used to alter Tamper Protection on device by admin or apps or malware  having admin privilege. With that said if you use GPO to manage your device through ConfigMgr, we are planning to support such devices from MEM (Microsoft Endpoint Manager). Stay tuned for our next update... :smile:.

Contributor

This is only available for 1903 and up? :( we have 1809s mostly right now..

Microsoft

@rockypabillore  - this is available for Windows versions 1709, 1803, 1809 and 1903

Occasional Visitor

what about for older Windows 10 versions like 1703 & 1607 & maybe LTSB 2016, Kasia?