How to enable Windows Defender's potentially unwanted programs protection - gHacks Tech News

How to enable Windows Defender's potentially unwanted programs protection

One of the latest additions to Windows Defender Antivirus' arsenal of protection tools blocks potentially unwanted programs, short PUPs, from landing on the system or being installed on Windows PCs.

Note: Potentially Unwanted Programs (PUPs) and Potentially Unwanted Applications (PUAs) refer to the same type of potentially unwanted software.

Microsoft improved the defensive capabilities of the built-in antivirus and security tool Windows Defender significantly for Windows 10.

The company added features such as Windows Defender System Guard and Application Guard, Network protection, Controlled Folder Access, or Exploit protection in recent years to the tool. Microsoft even published Windows Defender Browser Protection for Google Chrome.

Some features are reserved for Enterprise editions of Windows 10 but some are also available in Home editions.

Windows Defender's PUP protection

Windows Defender may block potentially unwanted programs from being downloaded or installed on Windows 10 systems. The feature is not enabled by default and can only be enabled using PowerShell, InTune, or System Center.

Potentially Unwanted Programs are not classified as malware usually; these programs may come as extra installation offers during software installations on a Windows PC or as standalone programs that don't provide a lot of value, if at all.

Microsoft gives the following examples of typical PUA (Potentially Unwanted Applications):

  • Various types of software bundling
  • Ad-injection into web browsers
  • Driver and registry optimizers that detect issues, request payment to fix the errors, but remain on the endpoint and make no changes or optimizations (also known as "rogue antivirus" programs)

Windows Defender Antivirus does not block potentially unwanted programs by default. You can check the protection on Microsoft's Demo Scenario site to test a system's protection against various threats.

Just click on the link under Scenario to test the protection. This should work with Windows Defender and other antivirus software installed provided that they are configured to block PUPs.

The protection works in the following cases:

  • The file is downloaded in a browser.
  • The file is in a folder with "downloads" or "temp" in the path.
  • The file is on the user's Desktop.
  • The file is not under %programfiles%, %appdata%, or %windows%, and does not meet any of the conditions above.

Windows Defender Antivirus places files identified as PUP in the Quarantine. Users are informed about the identification of PUPs on the system similar to how they are informed about other threats detected by Windows Defender.

Admins and users can check the Windows Event Viewer for event ID 1160 as potentially unwanted program events are recorded under it.

Enable the potentially unwanted programs protection in Windows Defender

windows defender pup protection

Note that the following instructions apply to Windows 10 only and that you need elevated rights to make the change.

  1. Open Windows PowerShell with Windows-X and the selection of Windows PowerShell (Admin) from the context menu.
    • If you don't see Windows PowerShell (Admin) listed there do the following instead: open Start, type Windows PowerShell, right-click on the result, and select "run as administrator".
  2. Confirm the UAC prompt that is displayed.
  3. The console that opens should being with "Administrator".
  4. Type Set-MpPreference -PUAProtection Enabled and hit the Return-key.

Nothing is returned when you run the command. You can run the command Get-MpPreference to check the status of preferences of Windows Defender Antivirus. Find PUAProtection and make sure it is set to 1 (which means that it is enabled).

Tip: You can disable the protection again at a later point in time by running the command Set-MpPreference -PUAProtection Disabled. It is furthermore possible to set the feature to audit mode. Audit mode records events but won't interfere (read block) potentially unwanted programs. To set audit mode run MpPreference -PUAProtection AuditMode.

I recommend that you run the test scenario that Microsoft published to the demo site linked above to make sure the protection is enabled correctly.

Admins who work with Microsoft Intune or System Center Configuration Manager find instructions on enabling the Potentially Unwanted Applications protection of Windows Defender Antivirus on Microsoft's Doc website.

Whitelist blocked PUA applications

windows defender threat history

Detected PUAs are moved to the Quarantine of Windows Defender automatically. It happens that you want to keep a program that Windows Defender identified as a PUA.

You can restore any program that Windows Defender put into Quarantine and potentially unwanted programs are no exception to that.

  1. Use Windows-I to open the Settings application.
  2. Go to Update & Security > Windows Security.
  3. Select "Open Windows Security".
  4. Go to Virus & threat protection.
  5. Click on "Threat history".
  6. Select the threat that you want to recover and then restore.
    1. If you don't see the threat listed there, as only some are displayed there, select "see full history" to get the complete listing.

Windows Defender restores the file to its original location, e.g. the Downloads folder. You should be able to run it from there then without any issues.

Now You: Do you run antivirus software with PUP protection? (via Windows Central)

Summary
How to enable Windows Defender's potentially unwanted programs protection
Article Name
How to enable Windows Defender's potentially unwanted programs protection
Description
Find out how to enable protection against potentially unwanted program downloads on Windows 10 by enabling the protective feature in Windows Defender.
Author
Publisher
Ghacks Technology News
Logo
Advertisement

We need your help

Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.

We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats or subscription fees.

If you like our content, and would like to help, please consider making a contribution:


Previous Post: «
Next Post: »

Comments

  1. John said on August 20, 2018 at 3:24 pm
    Reply

    Essential article, thank you Martin! PUA protection enabled! :)

    1. owl said on August 21, 2018 at 2:19 am
      Reply

      Me too.

      1. ilev said on August 24, 2018 at 8:21 am
        Reply

        Me Too.

  2. Squuiid said on August 20, 2018 at 4:24 pm
    Reply

    What, no group policy settings? Ugh.
    Any ideas on how to mass implement this without System Centre or InTune?

  3. stefann said on August 20, 2018 at 6:19 pm
    Reply

    ‘Set-WinPreference -10Protection Enabled’ and You are back to XP or Windows 7…..LOL !

  4. Wayfarer said on August 20, 2018 at 6:37 pm
    Reply

    PUPs? PUAs? Given the way MS moves these days, is this any more than a list of 3rd-party software that Microsoft begrudges us installing?

    Not accusing – just asking…

  5. Anonymous said on August 20, 2018 at 8:57 pm
    Reply

    Are the files checked locally or remotely ? If remotely this is a privacy issue.

    In that case, is there any risk that sometimes personal documents are checked too as they could be files part of a PUA ? If yes this has the potential for a massive privacy issue, especially in case files or sensitive metadata are sent to Microsoft for further analysis.

    I find the description of the feature by Microsoft suspiciously uninformative.

  6. John IL said on August 20, 2018 at 11:34 pm
    Reply

    Simple enough, thanks!

  7. Armond said on August 21, 2018 at 1:23 am
    Reply

    Well, I could recall this GHacks article:
    https://www.ghacks.net/2015/11/30/add-adware-protection-to-windows-defender/
    So it seams enabling the same protection is still also possible via registry.
    Windows Registry Editor Version 5.00

    [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine]
    “MpEnablePus”=dword:00000001
    Thanks to both Martin and my memory:)

    1. John said on August 21, 2018 at 10:33 am
      Reply

      Very useful, thank you! :)

  8. Harro Glööckler said on August 21, 2018 at 5:29 am
    Reply

    I hope you guys realize PUPs aren’t just malware and worthless crapware, it also flags totally legitimate software like Cheat Engine, game trainers, Iobit’s and NirSoft’s things, some less known setup engines, etc.

    I always need to uncheck at least one “false positive” when running MBAM, SuperAntiSpyware and Spybot on-demand scans.

  9. wybo said on August 21, 2018 at 9:40 am
    Reply

    I just use an app called unchecky.

    https://unchecky.com/

    1. chesscanoe said on August 21, 2018 at 2:02 pm
      Reply

      I use Unchecky as well but its use has no direct bearing on the problem discussed here. Further, the registry change is not useful or needed if you use the latest Windows 10 x64 1803 Home, latest Chrome x64 beta, latest Defender, and latest Chrome extension Windows Defender Browser Protection extension. Using the test at https://www.amtso.org/feature-settings-check-potentially-unwanted-applications/ results in a successful Defender action per its message in the Notification area in the taskbar.

  10. TelV said on August 21, 2018 at 2:03 pm
    Reply

    The “latest additions to WD”….. that’s funny since third party AV have had the ability to block PUPs for the past five years at the very least.

  11. Emil said on August 21, 2018 at 2:44 pm
    Reply

    Piles of garbage and anti-garbage. The wonderful world of a truly free end-user software market ;-)

  12. acw said on August 23, 2018 at 8:59 am
    Reply

    should users of 3rd party av solutions toggle this on? (you know… use 3rd party av but have periodic wd scans turned on)

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

Please note that your comment may not appear immediately after you post it.