Posted  by  admin

Microsoft Defender Windows Server 2012 R2 Download

Windows Defender has been built into Windows 8, 8.1 and 10 by default to provide protection against malware, however there is no such default program installed in the Windows server operating system.

Mar 12, 2014 I've read that MS has included Defender in Server 2012 R2 but in my installation of this OS I could not find it, nor can I see it in any roles/features to add. The articles I read mention it's installed by default in when you do a core install, however I installed Server 2012 R2 Standard, complete with GUI. Install the Microsoft Defender for Endpoint for Windows Server 2012 R2 and 2016 package and enable passive mode. See Install Microsoft Defender Antivirus using command line. Apply the onboarding script for use with Group Policy downloaded from Microsoft Defender Security Center. Windows Server 2012 R2 (Requires Microsoft Defender for Endpoint) In some instances, Microsoft Defender Antivirus is referred to as Endpoint Protection; however, the protection engine is the same. Although the functionality, configuration, and management are largely the same for Microsoft Defender Antivirus on Windows 10 and Windows 11, there. Windows server 2012 R2 Free Download Bootable ISO image in single direct link. It allows you to manage your server and provides you easy cloud services.

To provide a basic level of security in a small server environment, we can install Microsoft Security Essentials with some simple modifications which contains most of the functionality of Windows Defender for free.

By default if you try to install Microsoft Security Essentials in Windows Server you will receive various errors which we will cover how to fix here.

While it is not possible to directly download Windows Defender to install, we can instead make use of Microsoft Security Essentials which is available as a slightly cut down version for older versions of Windows, such as Windows 7, in order to help protect against viruses, spyware and other malicious software. Microsoft Security Essentials provides most of the protection methods that Windows Defender does with the exception of rootkit and bootkit protections.

It is important to note that Microsoft Security Essentials is designed to provide a basic level of free protection for home or small business PCs rather than important server infrastructure. Despite this, users with a very small amount of Windows server installations have been looking for ways to install Windows Defender in order to provide at least a basic level of security.

While this is not officially supported, it does provide an increased level of security that is better than nothing, however it’s recommended that you look into using a proper product that is fit for purpose such as Microsoft’s System Center Endpoint Protection (SCEP) which is an enterprise antimalware solution. SCEP does require paid licensing to work, so for a very small environment Microsoft Security Essentials can at least provide a basic level of security protection.

Although installing Microsoft Security Essentials in a server operating system is not officially supported, it does work and correctly detects threats, as we’ll see here in our example.

Microsoft Security Essentials Installation Guide For Windows Server

    Download and Install

  1. Firstly you’ll want to download Microsoft Security Essentials onto your Windows server. Select the language of your choice and either 32-bit or 64-bit depending on the architecture your server operating system is using.
  2. Save the mseinstall.exe file somewhere locally on the server, do not simply run it as by default the installation will fail with the following error:
  3. To get around this error message, right click the mseinstall.exe file and select properties.
  4. From the properties window, select the compatibility tab. Within the compatibility tab tick “Run this program in compatibility mode for:” under Compatibility Mode and select Windows 7 from the drop down box, as shown.

    Click OK to continue.


  5. If you were to run the mseinstall.exe file at this point, you would receive a different error as shown below:

    In order to resolve this, run command prompt as administrator and enter the folder where the mseinstall.exe file is located. Run the mseinstall.exe file with the /disableoslimit flag on the end as shown below.

  6. The installation wizard should now correctly open and Microsoft Security Essentials can now be installed and will proceed without the previous error messages, click Next to continue and work through the installation wizard.
  7. Once the installation has completed you can optionally update and perform a scan, this is recommended as the definitions database needs to be kept up to date to find newer threats. An Internet connection will be required to download any available definition updates through the application, however these can also come through from Windows updates so if you have a WSUS server you can update from here as well. After updating a quick scan will take place.

    You can select the Settings tab to modify when the weekly automatic scheduled scan takes place, by default a quick scan is set to run every Sunday at 2am and will not use more than 50% of the available CPU resources.

  8. Testing

  9. Now that Microsoft Security Essentials has been successfully installed, we will test the actual functionality of the program to ensure that it will correctly identify a threat. To do this we will create a test EICARs file and see if the real-time protection automatically detects and quarantines it.

    Essentially we are just going to open Notepad and create a .txt file containing the test string defined on that page and then save it to the desktop.

  10. Shortly after saving the file we have been visually alerted that malware has been detected and that Microsoft Security Client is taking action to clean the detected malware.

    If we check the History tab of Microsoft Security Essentials we can then see the test file listed as a quarantined item, confirming that it is working correctly as intended in Windows Server 2012 R2.


Summary

Although not officially supported, we have successfully installed Microsoft Security Essentials (a cut down Windows Defender) in Windows Server 2012 R2 and confirmed that it is working correctly and detecting security threats.

This is better than the default level of security, which is none as Windows Defender is only built into Windows 8, 8.1 and 10 client operating systems, however it is recommended that server operating systems make use of enterprise solutions such as System Center Endpoint Protection (SCEP) or some other option available from some security vendor.

-->

Applies to:

Microsoft Defender Antivirus is available in the following editions/versions of Windows Server:

  • Windows Server 2022
  • Windows Server 2019
  • Windows Server, version 1803 or later
  • Windows Server 2016
  • Windows Server 2012 R2 (Requires Microsoft Defender for Endpoint)

In some instances, Microsoft Defender Antivirus is referred to as Endpoint Protection; however, the protection engine is the same. Although the functionality, configuration, and management are largely the same for Microsoft Defender Antivirus on Windows 10 and Windows 11, there are a few key differences on Windows Server:

  • On Windows Server, automatic exclusions are applied based on your defined Server Role.

  • On Windows Server, if you are running a non-Microsoft antivirus/antimalware solution, Microsoft Defender Antivirus does not go into either passive mode or disabled mode automatically. However, you can set Microsoft Defender Antivirus to passive or disabled mode manually.

Setting up Microsoft Defender Antivirus on Windows Server

The process of setting up and running Microsoft Defender Antivirus on a server platform includes several steps:

  1. Enable the interface.
  2. Install Microsoft Defender Antivirus.
  3. Verify Microsoft Defender Antivirus is running.
  4. Update your antimalware Security intelligence.
  5. (As needed) Submit samples.
  6. (As needed) Configure automatic exclusions.
  7. (Only if necessary) Set Windows Server to passive mode.

Enable the user interface on Windows Server

By default, Microsoft Defender Antivirus is installed and functional on Windows Server. Sometimes, the user interface (GUI) is installed by default, but the GUI is not required. You can use PowerShell, Group Policy, or other methods to manage Microsoft Defender Antivirus.

If the GUI is not installed on your server, and you want to install it, either the Add Roles and Features wizard or PowerShell cmdlets.

Windows Server Versions

Note

This option is not available for Windows Server 2012 R2. For more information, see Options to install Microsoft Defender for Endpoint.

Turn on the GUI using the Add Roles and Features Wizard

Server
  1. See Install roles, role services, and features by using the add Roles and Features Wizard, and use the Add Roles and Features Wizard.

  2. When you get to the Features step of the wizard, under Windows Defender Features, select the GUI for Windows Defender option.

    In Windows Server 2016, the Add Roles and Features Wizard looks like this:

    In Windows Server 2019 and Windows Server 2022, the Add Roles and Feature Wizard is similar.

Turn on the GUI using PowerShell

The following PowerShell cmdlet will enable the interface:

Microsoft Defender Windows Server 2012 R2 Download

Install Microsoft Defender Antivirus on Windows Server

If you need to install or reinstall Microsoft Defender Antivirus on Windows Server, you can do that using either the Add Roles and Features Wizard or PowerShell.

Use the Add Roles and Features Wizard to install Microsoft Defender Antivirus

Microsoft Defender Windows Server 2012 R2 Download Iso Full Version

  1. Refer to this article, and use the Add Roles and Features Wizard.

  2. When you get to the Features step of the wizard, select the Microsoft Defender Antivirus option. Also select the GUI for Windows Defender option.

Use PowerShell to install Microsoft Defender Antivirus

To use PowerShell to install Microsoft Defender Antivirus, run the following cmdlet:

Event messages for the antimalware engine included with Microsoft Defender Antivirus can be found in Microsoft Defender AV Events.

Verify Microsoft Defender Antivirus is running

Once Microsoft Defender Antivirus is installed, your next step is to verify that it's running. On your Windows Server endpoint, run the following PowerShell cmdlet:

To verify that firewall protection is turned on, run the following PowerShell cmdlet:

As an alternative to PowerShell, you can use Command Prompt to verify that Microsoft Defender Antivirus is running. To do that, run the following command from a command prompt:

The sc query command returns information about the Microsoft Defender Antivirus service. When Microsoft Defender Antivirus is running, the STATE value displays RUNNING.

Update antimalware Security intelligence

To get updated antimalware security intelligence, you must have the Windows Update service running. If you use an update management service, like Windows Server Update Services (WSUS), make sure that updates for Microsoft Defender Antivirus Security intelligence are approved for the computers you manage.

By default, Windows Update does not download and install updates automatically on Windows Server 2019 or Windows Server 2022, or Windows Server 2016. You can change this configuration by using one of the following methods:


MethodDescription
Windows Update in Control PanelInstall updates automatically results in all updates being automatically installed, including Windows Defender Security intelligence updates.
Download updates but let me choose whether to install them allows Windows Defender to download and install Security intelligence updates automatically, but other updates are not automatically installed.
Group PolicyYou can set up and manage Windows Update by using the settings available in Group Policy, in the following path: Administrative TemplatesWindows ComponentsWindows UpdateConfigure Automatic Updates
The AUOptions registry keyThe following two values allow Windows Update to automatically download and install Security intelligence updates:
4 - Install updates automatically. This value results in all updates being automatically installed, including Windows Defender Security intelligence updates.
3 - Download updates but let me choose whether to install them. This value allows Windows Defender to download and install Security intelligence updates automatically, but other updates are not automatically installed.

To ensure that protection from malware is maintained, we recommend that you enable the following services:

  • Windows Error Reporting service
  • Windows Update service

The following table lists the services for Microsoft Defender Antivirus and the dependent services.


Service NameFile LocationDescription
Windows Defender Service (WinDefend)C:Program FilesWindows DefenderMsMpEng.exeThis is the main Microsoft Defender Antivirus service that needs to be running at all times.
Windows Error Reporting Service (Wersvc)C:WINDOWSSystem32svchost.exe -k WerSvcGroupThis service sends error reports back to Microsoft.
Windows Defender Firewall (MpsSvc)C:WINDOWSsystem32svchost.exe -k LocalServiceNoNetworkWe recommend leaving the Windows Defender Firewall service enabled.
Windows Update (Wuauserv)C:WINDOWSsystem32svchost.exe -k netsvcsWindows Update is needed to get Security intelligence updates and antimalware engine updates

Submit samples

Sample submission allows Microsoft to collect samples of potentially malicious software. To help provide continued and up-to-date protection, Microsoft researchers use these samples to analyze suspicious activities and produce updated antimalware Security intelligence. We collect program executable files, such as .exe files and .dll files. We do not collect files that contain personal data, like Microsoft Word documents and PDF files.

Submit a file

  1. Review the submission guide.
  2. Visit the sample submission portal, and submit your file.

Enable automatic sample submission

To enable automatic sample submission, start a Windows PowerShell console as an administrator, and set the SubmitSamplesConsent value data according to one of the following settings:

Server


SettingDescription
0 - Always promptThe Microsoft Defender Antivirus service prompts you to confirm submission of all required files. This is the default setting for Microsoft Defender Antivirus, but is not recommended for installations on Windows Server 2016 or 2019, or Windows Server 2022 without a GUI.
1 - Send safe samples automaticallyThe Microsoft Defender Antivirus service sends all files marked as 'safe' and prompts for the remainder of the files.
2 - Never sendThe Microsoft Defender Antivirus service does not prompt and does not send any files.
3 - Send all samples automaticallyThe Microsoft Defender Antivirus service sends all files without a prompt for confirmation.

Note

This option is not available for Windows Server 2012 R2.

Configure automatic exclusions

To help ensure security and performance, certain exclusions are automatically added based on the roles and features you install when using Microsoft Defender Antivirus on Windows Server 2016 or 2019, or Windows Server 2022.

See Configure exclusions in Microsoft Defender Antivirus on Windows Server.

Passive mode and Windows Server

If you are using a non-Microsoft antivirus product as your primary antivirus solution on Windows Server, you must set Microsoft Defender Antivirus to passive mode or disabled mode.

For more information, see Install Microsoft Defender Antivirus on Windows Server.

Set Microsoft Defender Antivirus to passive mode using a registry key

You can set Microsoft Defender Antivirus to passive mode by setting the following registry key:

  • Path: HKLMSOFTWAREPoliciesMicrosoftWindows Advanced Threat Protection
  • Name: ForceDefenderPassiveMode
  • Type: REG_DWORD
  • Value: 1

Disable Microsoft Defender Antivirus using the Remove Roles and Features wizard

  1. See Install or Uninstall Roles, Role Services, or Features, and use the Remove Roles and Features Wizard.

  2. When you get to the Features step of the wizard, clear the Windows Defender Features option.

    If you clear Windows Defender by itself under the Windows Defender Features section, you will be prompted to remove the interface option GUI for Windows Defender.

    Microsoft Defender Antivirus will still run normally without the user interface, but the user interface cannot be enabled if you disable the core Windows Defender feature.

Turn off the Microsoft Defender Antivirus user interface using PowerShell

Microsoft Defender Windows Server 2012 R2 Download 64-bit

Microsoft Defender Windows Server 2012 R2 Download

To turn off the Microsoft Defender Antivirus GUI, use the following PowerShell cmdlet:

Are you using Windows Server 2012 R2 or Windows Server 2016?

You can now run Microsoft Defender Antivirus in passive mode on Windows Server 2012 R2 and and Windows Server 2016. For more information, see Options to install Microsoft Defender for Endpoint.

Microsoft Defender Windows Server 2012 R2 Download Torrent


Microsoft Defender Windows Server 2012 R2 Download Free

ProcedureDescription
Disable Microsoft Defender Antivirus using Group PolicyIn your Local Group Policy Editor, navigate to Administrative Template > Windows Component > Endpoint Protection > Disable Endpoint Protection, and then select Enabled > OK.
Disable Microsoft Defender Antivirus using a registry keyTo use the the DisableAntiSpyware registry key, navigate to HKEY_LOCAL_MACHINESOFTWAREPoliciesMicrosoftWindows Defender, and set or create a DWORD entry called DisableAntiSpyware. Set its value to 1 (which sets the registry key's value to true).
Disable Microsoft Defender Antivirus using PowerShellUse the following PowerShell cmdlet: Set-MpPreference -DisableRealtimeMonitoring $true
Uninstall Microsoft Defender Antivirus using PowerShellUse the following PowerShell cmdlet: Uninstall-WindowsFeature -Name Windows-Defender

Windows Server 2012 R2 Download Iso

See also