Policy
Select the channel for Microsoft Defender daily security intelligence updates
Windows 11 25H2
Policy overview
Key metadata and intent for this policy.
Supported OS tags: Windows10, Windows10RT, Windows11, WindowsServer2016
Enable this policy to specify when devices receive Microsoft Defender security intelligence updates during the daily gradual rollout. Current Channel (Staged): Devices will be offered updates after the release cycle. Suggested to apply to a small, representative part of production population (~10%). Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%). Critical - Time delay: Devices will be offered updates with a 48-hour delay. Suggested for critical environments only. If you disable or do not configure this policy, the device will stay up to date automatically during the daily release cycle. Suitable for most devices.
Registry values
How enabled and disabled states update the registry.
No explicit registry values are set for enabled or disabled states.
Policy elements
Inputs and configuration options exposed by this policy.
| Element | Type | Registry mapping | Constraints & behavior |
|---|---|---|---|
Select the channel for Microsoft Defender daily security intelligence updates: ID UpdateChannelsDropDown | enum | HKLM\Software\Policies\Microsoft\Windows Defender\SignaturesRing Type REG_DWORD | Options: Current Channel (Staged) (4), Current Channel (Broad) (5) |
Other policies in this category
Explore related policies at the same level.
- ComputerAllow antimalware service to remain running alwaysAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerAllow antimalware service to startup with normal priorityAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerConfigure detection for potentially unwanted applicationsAt least Windows Server 2016, Windows 10 Version 1607
- ComputerConfigure local administrator merge behavior for listsAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerConfigure scheduled task times randomization windowAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerControl whether exclusions are visible to local usersAt least Windows Server 2016, Windows 10 Version 1607
- ComputerControl whether or not exclusions are visible to Local AdminsAt least Windows Server 2016, Windows 10 Version 1607
- ComputerDefine addresses to bypass proxy serverAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerDefine proxy auto-config (.pac) for connecting to the networkAt least Windows Server 2016, Windows 10
- ComputerDefine proxy server for connecting to the networkAt least Windows Server 2012, Windows 8 or Windows RT
- ComputerDefine the directory path to copy support log filesAt least Windows Server 2016, Windows 10 Version 1607
- ComputerRandomize scheduled task timesAt least Windows Server 2012, Windows 8 or Windows RT