maciejrebisz.com

IT

How to configure and customize Windows Defender Security Center with Intune – Mobile-First Cloud-First

maximios December 8, 2021

In Windows 1703 – Windows Defender Security Center was first introduces.

In Windows 10 1709 there is a lot of new policies and settings and one of them is settings for Windows Defender Security Center. Windows 10 1709 is still in insider ring and subject to be chanced. Microsoft is doing a lot of investment to configure Windows 10 when it is MDM managed – there will never be as many setting in CSP as there are in GPO.

I will show how to hide “Family options”  and leave the rest ‘ they can all be hidden with different CSP.

First create a new profile in intune:

Name: Configure WindowsDefenderSecurityCenter

Platform:

Windows 10 and later

Profile Type:

Custom

Name: WindowsDefenderSecurityCenter/DisableFamilyUI

OMA-URI:

./Vendor/MSFT/Policy/Config/WindowsDefenderSecurityCenter/DisableFamilyUI

Data Type:

Integer

Value:

1 (0 = Disable and 1 = Enable)

This setting will set so that it is only critical notifications on the device – so the end-user only sees notifications when it is important.

Name: WindowsDefenderSecurityCenter/DisableEnhancedNotifications

OMA-URI:

./Vendor/MSFT/Policy/Config/WindowsDefenderSecurityCenter/DisableEnhancedNotifications

Data Type:

Integer

Value:

1 (0 = Disable and 1 = Enable)

Some of the other new settings in Windows Defender Security Center is company customization with branding and custom information, (Phone using Skype, Email, Help portal URL) in Windows Defender Security Center. For the custom settings to take effect on the device you need to set EnableCustomizedToasts or EnableInAppCustomization enabled.

Name: WindowsDefenderSecurityCenter/EnableInAppCustomization

OMA-URI:

./Vendor/MSFT/Policy/Config/WindowsDefenderSecurityCenter/EnableInAppCustomization

Data Type:

Integer

Value:

1 (0 = Disable and 1 = Enable)

Name: WindowsDefenderSecurityCenter/EnableCustomizedToasts

OMA-URI:

./Vendor/MSFT/Policy/Config/WindowsDefenderSecurityCenter/EnableCustomizedToasts

Data Type:

Integer

Value:

1 (0 = Disable and 1 = Enable)

When we have EnableCustomizedToasts or EnableInAppCustomization we can start doing the customization CSP.

Name: WindowsDefenderSecurityCenter/CompanyName

OMA-URI:

./Vendor/MSFT/Policy/Config/WindowsDefenderSecurityCenter/CompanyName

Data Type:

String

Value:

Osddeployment

Name: WindowsDefenderSecurityCenter/Phone

OMA-URI:

./Vendor/MSFT/Policy/Config/WindowsDefenderSecurityCenter/Phone

Data Type:

String

Value:

+45 11 22 33 44

Name: WindowsDefenderSecurityCenter/URL

OMA-URI:

./Vendor/MSFT/Policy/Config/WindowsDefenderSecurityCenter/URL

Data Type:

String

Value:

https://osddeployment.dk

The full documentation from Microsoft can be found here:

Policy CSP – WindowsDefenderSecurityCenter

This settings can also be set with a GPO when using Active Directory

How it the user experience when we start doing the policy:

When we hide FamilyUI it is not showed in Windows Defender Security Center

When we do the customization it look like this:

Our company name is showed in the right lower corner

When we click on the company name the rest of our customize information is showed.

How do we see if the settings are applied to the device:

In the settings apps we are also getting more information in Windows 1709

Settings App – Account –

Policy area applied – WindowsDefenderSecurityCenter

When exporting the local policy settings we get a XML file with all the settings that are applied to the user or device.

Search for WindowsDefenderSecurityCenter then we can see all the related settings

Related Posts

IT /

Intune – Windows device enrollment restrictions – Cloud First

IT /

How to add “hidden” Windows UWP to Windows Store for Business – Cloud First

IT /

Office 2016 Active Directory-Based activation – Cloud First

‹ How to packages Adobe Reader for Enterprise Deployment – Mobile-First Cloud-First › How to setup Microsoft OMS for Office 365 management solution Preview – Mobile-First Cloud-First

Recent Posts

  • Intune – Windows device enrollment restrictions – Cloud First
  • How to add “hidden” Windows UWP to Windows Store for Business – Cloud First
  • Office 2016 Active Directory-Based activation – Cloud First
  • How to deploy Windows Local Experience Packs with Intune – Cloud First
  • Conditional Access for Outlook Web Access (OWA) – Cloud First

Recent Comments

No comments to show.

Archives

  • November 2025
  • October 2025
  • August 2025
  • July 2025
  • June 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • November 2024
  • September 2024
  • July 2024
  • June 2024
  • March 2024
  • December 2023
  • August 2023
  • June 2023
  • March 2023
  • February 2023
  • December 2022
  • September 2022
  • August 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • September 2021
  • August 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • September 2019
  • June 2019
  • April 2019
  • March 2019
  • February 2019
  • March 2018
  • February 2018
  • December 2017
  • October 2017
  • August 2017

Categories

  • IT

Back to Top

© maciejrebisz.com 2026
Powered by WordPress • Themify WordPress Themes