maciejrebisz.com

IT

How to customize Windows Defender Security Center with Intune Endpoint Protection profile – Mobile-First Cloud-First

maximios May 11, 2021

In Windows 1703 – Windows Defender Security Center was first introduces.

In Windows 10 1709 there is a lot of new policies and settings and one of them is settings for Windows Defender Security Center. I first did a blogpost about this back when Windows 10 1709 still was a insider build, the original post can be found here.

When I did the original post the settings was not published in Intune – so I did in with a custom Windows 10 profile in Intune – and used the OMA-URI, but now there is a profile directly to configure Windows Defender.

I will show how to hide “Family options”  and leave the rest ‘ they can also be hidden from the profile.

First create a new profile in intune:

  1. Name: Windows 10 – Windows Defender Security Center
  2. Platform: Windows 10 and later
  3. Profile Type :Endpoint protection
  4. Settings: Configure
  5. Windows Defender Security Center: 

You have the possibility to hide/block the various areas of Windows Defender Security Center app.

In this case I will hide/block access to the family options so it is not shown in my enterprise environment.

  1. Family options: Hide
  2. Notifications from the displayed areas of the app: Block non-critical notifications

Notifications from the displayed areas of app can be set to the following:

Block all notifications – this will block all notifications from the app

Block non-critical notifications – this will block all non-critical notifications from the app

You can configure the IT contact information in Windows Defender Security Center app

Some of the other new settings in Windows Defender Security Center is company customization with branding and custom information, (Phone using Skype, Email, Help portal URL) in Windows Defender Security Center. 

  1. IT contact information: Display in app and in notifications
  2. IT organization name: Osddeployment
  3. IT department phone number or Skype ID: +45 11 22 33 44
  4. IT department email address: [email protected]
  5. IT support website URL: https://osddeployment.dk

IT contact information can be set to 3 different values:

  • Display in app and in notifications
  • Display only in app
  • Display only in notifications

The OMA-URI that will be deployed to the devices from Intune is:

Name: WindowsDefenderSecurityCenter/CompanyName

OMA-URI:

./Vendor/MSFT/Policy/Config/WindowsDefenderSecurityCenter/CompanyName

Data Type:

String

Value:

Osddeployment

Name: WindowsDefenderSecurityCenter/Phone

OMA-URI:

./Vendor/MSFT/Policy/Config/WindowsDefenderSecurityCenter/Phone

Data Type:

String

Value:

+45 11 22 33 44

Name: WindowsDefenderSecurityCenter/URL

OMA-URI:

./Vendor/MSFT/Policy/Config/WindowsDefenderSecurityCenter/URL

Data Type:

String

Value:

https://osddeployment.dk ./Vendor/MSFT/Policy/Config/WindowsDefenderSecurityCenter/DisableFamilyUI

Data Type:

Integer

Value:

1 (0 = Disable and 1 = Enable)

This settings can also be set with a GPO when using Active Directory

How it the user experience when we start doing the policy:

When we hide FamilyUI it is not showed in Windows Defender Security Center

When we do the customization it look like this:

Our company name is showed in the right lower corner

When we click on the company name the rest of our customize information is showed.

How do we see if the settings are applied to the device:

In the settings apps we are also getting more information in Windows 1709

Settings App – Account –

Policy area applied – WindowsDefenderSecurityCenter

When exporting the local policy settings we get a XML file with all the settings that are applied to the user or device.

Search for WindowsDefenderSecurityCenter then we can see all the related settings

More information :

Policy CSP – WindowsDefenderSecurityCenter

Configure the notifications that appear on endpoints

Related Posts

IT /

Intune – Windows device enrollment restrictions – Cloud First

IT /

How to add “hidden” Windows UWP to Windows Store for Business – Cloud First

IT /

Office 2016 Active Directory-Based activation – Cloud First

‹ Capture Windows 10 “Hit failure while pre-validate sysprep” – Failed to remove apps for current user – Mobile-First Cloud-First › How to create partial lockdown of StartMenu with Intune – Mobile-First Cloud-First

Recent Posts

  • Intune – Windows device enrollment restrictions – Cloud First
  • How to add “hidden” Windows UWP to Windows Store for Business – Cloud First
  • Office 2016 Active Directory-Based activation – Cloud First
  • How to deploy Windows Local Experience Packs with Intune – Cloud First
  • Conditional Access for Outlook Web Access (OWA) – Cloud First

Recent Comments

No comments to show.

Archives

  • November 2025
  • October 2025
  • August 2025
  • July 2025
  • June 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • November 2024
  • September 2024
  • July 2024
  • June 2024
  • March 2024
  • December 2023
  • August 2023
  • June 2023
  • March 2023
  • February 2023
  • December 2022
  • September 2022
  • August 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • September 2021
  • August 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • February 2020
  • January 2020
  • December 2019
  • October 2019
  • September 2019
  • June 2019
  • April 2019
  • March 2019
  • February 2019
  • March 2018
  • February 2018
  • December 2017
  • October 2017
  • August 2017

Categories

  • IT

Back to Top

© maciejrebisz.com 2026
Powered by WordPress • Themify WordPress Themes