Under policies and Non Compliances - I see Windows Defender Exploit Guard to be enabled, I have enabled it but I still see the Non Compliance

Sanket Kalyankar 0 Reputation points
2025-11-19T13:01:40.5866667+00:00

I have a Policy Non Compliance: ES-2 Use modern anti-malware software and under details I get Windows Defender Exploit Guard to be enabled. I followed documentation and enabled the Windows Defender Exploit Guard, along with Controlled Folder protection enabled.

But my non compliance flag does not go away, what do I do?

Azure Policy
Azure Policy
An Azure service that is used to implement corporate governance and standards at scale for Azure resources.
{count} votes

1 answer

Sort by: Most helpful
  1. Siva shunmugam Nadessin 3,425 Reputation points Microsoft External Staff Moderator
    2025-11-28T11:23:38.6866667+00:00

    Hello Sanket Kalyankar,

    Follow below steps

    1) Verify the anti‑malware solution and state on the VM

    Azure ES‑2 expects Microsoft Defender Antivirus (and often Defender for Endpoint) with:

    • Real‑time protection ON
    • Signatures updated within ≤24 hours
    • Optional WDEG components (ASR, Network Protection, CFA) per your baseline
    # Defender AV health & signature currency
    Get-MpComputerStatus | Select AMServiceEnabled, AntivirusEnabled, RealTimeProtectionEnabled,
                           AntivirusSignatureLastUpdated, NISEnabled, IoavProtectionEnabled
     
    # WDEG & CFA/ASR preferences
    Get-MpPreference | Select EnableNetworkProtection, EnableControlledFolderAccess,
    

    If any are off/stale:

    Set-MpPreference -DisableRealtimeMonitoring $false
    Update-MpSignature
    Set-MpPreference -EnableNetworkProtection Enabled
    # CFA is optional for ES-2; enable only if in your baseline:
    Set-MpPreference -EnableControlledFolderAccess Enabled
    

    2) Make sure Azure can see the configuration (extensions/agents)

    ES‑2 compliance for Azure VMs depends on these components being present:

    • Guest Configuration (GC) extension → lets Azure Policy audit OS settings
    • (If using Defender for Cloud endpoint assessments) Azure Monitor Agent (AMA) and required data collection
    • (If your initiative maps to MDE signals) Microsoft Defender for Endpoint (MDE) onboarding and reporting

    Validate extensions from Azure:

    # Guest Configuration extension on the VM
    Get-AzVMExtension -ResourceGroupName <RG> -VMName <VM> |
    If GC/AMA/MDE are missing, deploy them (see Step 4 remediation).
    

    Check the Azure Policy assignment details

    Common causes of persistent Non‑compliant:

    • Assignment effect is AuditIfNotExists/DeployIfNotExists but the managed identity doesn’t have rights → remediation never runs
    • Wrong parameters/scope (subscription/RG/OS filters) → target VM not covered
    • Policy requires MDE/endpoint protection data but MDE isn’t onboarded

    Verify in Azure Policy (Portal):

    • Assignments → open your ES‑2 initiative → confirm System‑assigned managed identity is ON.
    • Permissions → The assignment’s identity needs Contributor (or appropriate) on the VM/RG.
    • Parameters → OS type, resource filters, workspace links (if applicable) are correct.
    • Compliance tab → select your VM → Create remediation task for non‑compliant definitions and monitor task status.

    4) Remediate from Azure (examples)

    A. Re‑install Guest Configuration on the VM (if missing):

    Set-AzVMExtension -ResourceGroupName <RG> -VMName <VM> `
      -Name "GuestConfiguration" -Publisher "Microsoft.GuestConfiguration  -Name "GuestConfiguration" -Publisher "Microsoft.GuestConfiguration" `
    

    B. Ensure AMA is present (for Defender for Cloud endpoint assessment):

    New-AzVMExtension -ResourceGroupName <RG> -VMName <VM> `  -Name "AzureMonitorWindowsAgent" -Publisher "Microsoft.Azure.Monitor" `  -Type "AzureMonitorWindowsAgent" -TypeHandlerVersion "1.10"
    

    C. MDE onboarding (if your ES‑2 mapping expects MDE signals): Use your org’s onboarding package (local script or MSI) and confirm the device appears in the MDE portal and is reporting. [Microsoft...r Endpoint | SharePoint]

    After remediation, run a compliance scan (Guest Configuration will evaluate on its next cycle) and expect status changes within a few hours; endpoint protection assessments can lag until the next heartbeat.

    5) Force a fresh VM‑side compliance posture (optional but helpful)

    # Confirm Defender AV final state again
    Get-MpComputerStatus | Select AntivirusEnabled, RealTimeProtectionEnabled, AntivirusSignatureLastUpdated 
    # If policy depends on Defender for Cloud endpoint state, ensure AMA is sending
    #
    

    Why the flag didn’t clear after WDEG/CFA

    • ES‑2 is about “modern anti‑malware” coverage + recognized telemetry (Defender AV/MDE), not just WDEG features.
    • Without Guest Configuration/AMA/MDE and a successful Policy remediation/evaluation, Azure doesn’t mark the VM compliant—even if the OS setting is correct.

    Let us know the above steps helped.


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.