Microsoft Windows Defender Antivirus STIG Ver 2, Rel 8 Checklist Details (Checklist Revisions)
SCAP 1.3 Content:
-
Download SCAP 1.3 Content - Microsoft Defender Antivirus STIG SCAP Benchmark - Ver 2, Rel 8
- Author: Defense Information Systems Agency
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - Microsoft Defender Antivirus STIG - Ver 2, Rel 8
- Defense Information Systems Agency
-
Download Intune Policies - Intune Policy - January 2026
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
-
Download GPOs - Group Policy Objects (GPOs) - January 2026
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
-
Download Automated Content - SCC 5.14 Windows
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
- Defense Information Systems Agency
Target:
| Target | CPE Name |
|---|---|
| Microsoft Windows Defender | cpe:/a:microsoft:windows_defender (View CVEs) |
Checklist Highlights
- Checklist Name:
- Microsoft Windows Defender Antivirus STIG
- Checklist ID:
- 807
- Version:
- Ver 2, Rel 8
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 07/26/2017
Checklist Summary:
The Microsoft Windows Defender Antivirus Security Technical Implementation Guide (STIG) provides the technical security policies, requirements, and implementation details for applying security concepts to the Defender Antivirus application. This document is meant to improve the security of Department of Defense (DoD) information systems.
Checklist Role:
- Antivirus Software
Known Issues:
Not provided.
Target Audience:
Not provided.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided.
Regulatory Compliance:
This document is provided under the authority of DoDI 8500.01.
Comments/Warnings/Miscellaneous:
Not provided.
Disclaimer:
Not provided.
Product Support:
Parties within the DoD and Federal Government's computing environments can obtain the applicable STIG from the Information Assurance Support Environment (IASE) website. This site contains the latest copies of any STIGs, SRGs, and other related security information. The address for the IASE site is http://iase.disa.mil/.
Point of Contact:
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
Dependency/Requirements:
| URL | Description |
|---|
References:
| Reference URL | Description |
|---|
