Back
🔒
Microsoft Defender Antivirus STIG Implementation (Ver 2, Rel 7)
Medium
21 items
·
2 hours
testuser
Published 1 month ago
This checklist guides general administrators through implementing the Microsoft Defender Antivirus STIG (Ver 2, Rel 7). It covers obtaining official resources, deploying GPO/Intune policies, verifying integrity, running compliance scans, and documenting changes for security teams.
Progress
0 / 21
- Obtain official STIG from IASE — Download the STIG package from the IASE site (iase.disa.mil).
- Download STIG resources
- Download SCAP 1.3 content (SCAP benchmark) — Use the SCAP benchmark for automated compliance scans.
- Download Group Policy Objects (GPOs) and resources — Get GPO files and supporting resource bundles for AD deployment.
- Download Intune policies and SCC automated content — Grab Intune policy packages and SCC/SCCM content for automation.
- Verify SHA checksums for downloaded files — Compare file SHAs with DISA-provided checksums before import.
- Import GPOs into Active Directory — Import only validated GPO files for controlled deployment.
- Test imported GPOs in a lab OU — Validate settings apply correctly without breaking endpoints.
- Link GPOs to target OUs — Apply policies to representative organizational units first.
- Deploy Intune policies to managed endpoints — Use staged rollouts for large environments to limit impact.
- Enable real-time and cloud-delivered protection — Turn on both to increase detection and protection coverage.
- Enable Tamper Protection — Prevent unauthorized changes to Defender settings.
- Configure signature update source and schedule — Set Windows Update, WSUS, or other approved update sources and frequency.
- Configure automatic and scheduled scans — Schedule daily quick scans and weekly full scans as needed.
- Configure approved exclusions per policy — Only add exclusions that are formally approved by security policy.
- Enable detailed event logging and forward to SIEM — Ensure events are collected and forwarded to central logging.
- Run SCAP/XCCDF compliance scan and remediate findings — Execute compliance scans and address deviations promptly.
- Record and document policy versions, SHAs, and changes — Log version numbers, SHAs, dates, and approvers for audits.
- Schedule regular resource and policy update reviews — Set reminders to check DISA updates and new STIG revisions.
- Verify SCC/SCCM integration and automated content updates — Confirm automated content pulls and deployments function correctly.
- Contact STIG point of contact for questions — Email the DISA POC at [email protected] for clarifications.
Your Stats
🏆
0
Completed
📅
—
Last Done
⏱️
—
Last Time
Completion Rate
Items checked per run
⚡
—
Fastest Run
🔥
0
Streak
🚫
—
Most Skipped Step
🔄
0
Resets
📝 My Notes