Skip to content
This repository has been archived by the owner on Apr 14, 2023. It is now read-only.

Latest commit

 

History

History

WindowsDefenderAntiVirus

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

Windows Defender Antivirus connectivity tests

Usage

  1. Import this file: Import-Module .\WDAVConnectivity.psm1
  2. Run one of the following:
    • $connectivity = Get-WDAVConnectivity
    • $connectivity = Get-WDAVConnectivity -Verbose
    • $connectivity = Get-WDAVConnectivity -PerformBlueCoatLookup
    • $connectivity = Get-WDAVConnectivity -Verbose -PerformBlueCoatLookup
  3. Filter results: $connectivity | Format-List -Property Blocked,TestUrl,UnblockUrl,DnsAliases,IpAddresses,Description,Resolved,ActualStatusCode,ExpectedStatusCode,UnexpectedStatus
  4. Save results to a file: Save-HttpConnectivity -Objects $connectivity -FileName ('WDAVConnectivity_{0:yyyyMMdd_HHmmss}' -f (Get-Date))

Tested URLs

Test URL URL to Unblock Description
https://wdcp.microsoft.com https://wdcp.microsoft.com Windows Defender Antivirus cloud-delivered protection service, also referred to as Microsoft Active Protection Service (MAPS). Used by Windows Defender Antivirus to provide cloud-delivered protection.
https://wdcpalt.microsoft.com https://wdcpalt.microsoft.com Windows Defender Antivirus cloud-delivered protection service, also referred to as Microsoft Active Protection Service (MAPS). Used by Windows Defender Antivirus to provide cloud-delivered protection.
https://update.microsoft.com https://*.update.microsoft.com Microsoft Update Service (MU). Signature and product updates.
https://download.microsoft.com https://*.download.microsoft.com Alternate location for Windows Defender Antivirus definition updates if the installed definitions fall out of date (7 or more days behind).
https://onboardingpackageseusprd.blob.core.windows.net https://*.blob.core.windows.net Malware submission storage. Upload location for files submitted to Microsoft via the Submission form or automatic sample submission.
http://www.microsoft.com/pkiops/crl http://www.microsoft.com/pkiops Microsoft Certificate Revocation List (CRL). Used by Windows when creating the SSL connection to MAPS for updating the CRL.
http://www.microsoft.com/pkiops/certs http://www.microsoft.com/pkiops
http://crl.microsoft.com/pki/crl/products http://crl.microsoft.com Microsoft Certificate Revocation List (CRL). Used by Windows when creating the SSL connection to MAPS for updating the CRL.
http://www.microsoft.com/pki/certs http://www.microsoft.com/pki
https://msdl.microsoft.com/download/symbols https://msdl.microsoft.com/download/symbols Microsoft Symbol Store. Used by Windows Defender Antivirus to restore certain critical files during remediation flows.
https://vortex-win.data.microsoft.com https://vortex-win.data.microsoft.com Used by Windows to send client diagnostic data, Windows Defender Antivirus uses this for product quality monitoring purposes.
https://settings-win.data.microsoft.com https://settings-win.data.microsoft.com Used by Windows to send client diagnostic data, Windows Defender Antivirus uses this for product quality monitoring purposes.
https://definitionupdates.microsoft.com https://definitionupdates.microsoft.com Windows Defender Antivirus definition updates for Windows 10 1709+
https://unitedstates.cp.wd.microsoft.com https://unitedstates.cp.wd.microsoft.com Geo-affinity URL for wdcp.microsoft.com and wdcpalt.microsoft.com as of 06/26/2018 with WDAV 4.18.1806.18062+.
https://adldefinitionupdates-wu.azurewebsites.net https://adldefinitionupdates-wu.azurewebsites.net Alternative to https://adl.windows.com which allows the compatibility update to receive the latest compatibility data from Microsoft.
http://ctldl.windowsupdate.com http://ctldl.windowsupdate.com Microsoft Certificate Trust List download URL.

WDATP query

NetworkCommunicationEvents
| where InitiatingProcessFileName in ('MpCmdRun.exe', 'MsMpEng.exe', 'MpSigStub.exe') or InitiatingProcessParentFileName in ('MpCmdRun.exe', 'MsMpEng.exe', 'MpSigStub.exe')
| where InitiatingProcessFileName != 'powershell.exe' or InitiatingProcessParentFileName != 'powershell.exe'
| where RemoteUrl contains 'microsoft' or RemoteUrl contains 'windows' or RemoteUrl contains 'azure'
| summarize count() by RemoteUrl,RemotePort
| order by count_ desc

References