Policy
Select cloud protection level
Windows 11 25H2
Policy overview
Key metadata and intent for this policy.
Supported OS tags: Windows10, Windows10RT, Windows11, WindowsServer2016
This policy setting determines how aggressive Microsoft Defender Antivirus will be in blocking and scanning suspicious files. If this setting is on, Microsoft Defender Antivirus will be more aggressive when identifying suspicious files to block and scan; otherwise, it will be less aggressive and therefore block and scan with less frequency. For more information about specific values that are supported, see the Microsoft Defender Antivirus documentation site. Note: This feature requires the "Join Microsoft MAPS" setting enabled in order to function. Possible options are: (0x0) Default Microsoft Defender Antivirus blocking level (0x1) Moderate Microsoft Defender Antivirus blocking level, delivers verdict only for high confidence detections (0x2) High blocking level - aggressively block unknowns while optimizing client performance (greater chance of false positives) (0x4) High+ blocking level – aggressively block unknowns and apply additional protection measures (may impact client performance) (0x6) Zero tolerance blocking level – block all unknown executables
Registry values
How enabled and disabled states update the registry.
No explicit registry values are set for enabled or disabled states.
Policy elements
Inputs and configuration options exposed by this policy.
| Element | Type | Registry mapping | Constraints & behavior |
|---|---|---|---|
Select cloud blocking level ID MpCloudBlockLevel | enum | HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine\MpCloudBlockLevel Type REG_DWORD | Options: Default blocking level (0), Moderate blocking level (1), High blocking level (2), High+ blocking level (4), Zero tolerance blocking level (6) |
Other policies in this category
Explore related policies at the same level.