

Right-click Command prompt and select Run as administrator.Įnter the following command and press Enter: netsh winhttp set proxy :įor example: netsh winhttp set proxy 10.0.0.6:8080.
#Get proxie windows#

You can use PowerShell with the Set-MpPreference cmdlet to configure these options: If you need to set up advanced configurations with multiple proxies, use Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define addresses to bypass proxy server and prevent Microsoft Defender Antivirus from using a proxy server for those destinations. If required, you can use Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy auto-config (.pac) for connecting to the network.
#Get proxie update#
Instead, it will use a system-wide proxy if configured to use Windows Update, or the configured internal update source according to the configured fallback order. Microsoft Defender Antivirus will not use the static proxy to connect to Windows Update or Microsoft Update for downloading updates. This will break the secure cloud connection. Ensure your proxy solution does not perform SSL inspection. The registry value ProxyServer takes the following string format: :įor resiliency purposes and the real-time nature of cloud-delivered protection, Microsoft Defender Antivirus will cache the last known working proxy. Under the registry key HKLM\Software\Policies\Microsoft\Windows Defender, the policy sets the registry value ProxyServer as REG_SZ. Note, the URL must have either or For supported versions for see Manage Microsoft Defender Antivirus updates. Set it to Enabled and define the proxy server. For EDR in block mode has primary anti-malware solution when using a non-Microsoft solution.Ĭonfigure the static proxy using the Group Policy available in Administrative Templates:Īdministrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy server for connecting to the network. Note, the connectivity is required for custom indicators when Defender Antivirus is your active anti-malware solution. Microsoft Defender Antivirus cloud-delivered protection provides near-instant, automated protection against new and emerging threats.

The above registry value is applicable only starting with MsSense.exe version 10.8210.* and later, or version 10.8049.* and later (on Windows Server 2012R2/2016 with the unified agent) Configure a static proxy for Microsoft Defender Antivirus Reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection" /v PreferStaticProxyForHttpRequest /t REG_DWORD /d 1 /f The following command can be used to insert the registry value in the correct location: Parent registry path location for "PreferStaticProxyForHttpRequest" is "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection" If you are using 'TelemetryProxyServer' setting on devices that are otherwise completely offline, meaning the operating system is unable to connect for the online certificate revocation list or Windows Update, then it is recommended to add the additional registry setting PreferStaticProxyForHttpRequest with a value of 1. HKLM\Software\Policies\Microsoft\Windows\DataCollectionĬonfigure connected user experiences and telemetry Set it to Enabled and select Disable Authenticated Proxy usage.Īdministrative Templates > Windows Components > Data Collection and Preview Builds > Configure connected user experiences and telemetry:Ĭonfigure authenticated proxy usage for the connected user experience and the telemetry service The group policy is available in Administrative Templates.Īdministrative Templates > Windows Components > Data Collection and Preview Builds > Configure Authenticated Proxy usage for the Connected User Experience and Telemetry Service. The static proxy is configurable through group policy (GP), both the settings under group policy values should be configured to the proxy server for using EDR. These updates improve the connectivity and reliability of the CnC (Command and Control) channel. Windows 10, version 1809 or Windows Server 2019, or Windows Server 2022.When using this option on Windows 10, or Windows 11, or Windows Server 2019, or Windows Server 2022, it is recommended to have the following (or later) build and cumulative update rollup:
