Manually Update Windows Defender

Manually Update Windows Defender

Online security is more important than ever, and given the prevalence of Windows operating systems, knowing how to update Microsoft Defender, the built-in anti-malware package included with modern Windows operating systems, is vital to your security plans. Alternately known as Windows Security, it’s the go-to tool for PC security. However, as with general Windows Update runs, sometimes the Defender updates don’t work. They’re usually a part of regular Windows updates, but if it’s not working for you, there are other ways to update Defender.

Manually Update Windows Defender

1. Use Microsoft Defender’s Update Facility

Under the Settings app, you can get into Windows Security facilities by selecting Start>Settings>Update & Security>Windows Security when using Windows 10, swapping out for Privacy & Security in Windows 11 for the third step. You’ll find a button that says “Open Windows Security”. You can also open it directly by putting “Windows Security” in your Start menu.

The app has several entries, including “Virus & Threat Protection”. Click this procedure and look for the “Virus & Threat Protection Updates” at the bottom. Click the “Check for Updates” link at the bottom to start Defender checking for any available updates. If they’re available, they’ll be downloaded and installed. If Windows Update is stuck, it may work, or it may not. Fortunately, there’s another way to force a Microsoft Defender update, which we’ll cover next.

2. Update Defender Signatures Under Update-MpSignature

Using PowerShell, you can use a command to update the security definitions or signatures for Defender. It’s a simple, basic syntax for the command by just typing the command name in PowerShell. It works in both Windows 10 and 11, and though it doesn’t look like it does much in PowerShell, it does update Defender.

To check your protection, click “Virus & Threat Protection” in Windows Security, accessed as above, then scroll to “Virus & Threat Protection Updates” and click on “Protection Updates”. This allows you to check what version number you have in the signature, or security intelligence version.

3. Update Defender components in Microsoft

There’s a specific Microsoft web page for Defender updates titled “Microsoft Defender Update for Windows Operating System Installation Images”, which mentions there are three components to the Defender environment, all of which need regular updates. Because the signatures are changed daily, your anti-malware client and anti-malware engine, the two other specific parts of the Defender system, also need to be updated regularly to keep everything in balance. These updates typically happen one to four times monthly, depending on the severity of malware activity. Here are several methods for updating all parts of Defender:

Get Installation Images for Offline Updating

The page mentioned above provides you with a ZIP file to download for 23- or 64-bit Windows systems, with 32 not available for Windows 11. Because the page is constantly updated, refresh it to get the most recent version. Once you’ve downloaded your file, unzip the download contents to a directory, such as C:Defender Update, which creates a file structure you can work within PowerShell, with a PowerShell Script that can handle your .CAB file for the updates to all three components. Then invoke your PowerShell script so that you can add the update to your offline Windows image, with the same script supporting removal and rollback, along with list detail operations.

Updating Online Images

Because the Microsoft Update Catalog keeps Defender updates for Windows 10 using x86, x64, and ARM versions. Do a search for Microsoft Defender in the Catalog to locate them. For 64-bit systems, find one that has amd64fre at the end of the description. Others include x86fre for 32-bit systems as well as arm64fre for 64-bit ARM units. Because the files are self-installing executables, you can run them onto a Windows 10 machine anytime, though they’re not yet available for Windows 11.

With the different ways to download signatures and executables for Microsoft Defender, there are many ways to bring your system up to date. Start with automated Windows Update options, then move to manual updates in Windows Security, and finally use PowerShell for signature updates. Defender installation images can also be used, or the Microsoft Update Catalog. By knowing these methods, you’ll always be able to keep your Windows system updated.

Written by:  Mark and Art at Mathe, a team of IT specialists providing cloud services for accountants.

More Like This

157-Year-Old Lincoln College Succumbed To A Ransomware Attack

157-Year-Old Lincoln College Succumbed To A Ransomware Attack On May 13th, 2022, a college that has remained open through two world wars, the 1918 Spanish flu epidemic, and the Great Depression will close its doors. The college has been struggling to stay afloat in recent years, and the coronavirus pandemic and a recent ransomware attack …

157-Year-Old Lincoln College Succumbed To A Ransomware Attack Read More »

Read More

AA22-131A: Protecting Against Cyber Threats to Managed Service Providers and their Customers

Original release date: May 11, 2022 Summary Tactical actions for MSPs and their customers to take today: • Identify and disable accounts that are no longer in use. • Enforce MFA on MSP accounts that access the customer environment and monitor for unexplained failed authentication. • Ensure MSP-customer contracts transparently identify ownership of ICT security …

AA22-131A: Protecting Against Cyber Threats to Managed Service Providers and their Customers Read More »

Read More

Zero Trust Networks: What Are They?

Zero Trust Networks: What Are They? The internet has brought a world of opportunity for businesses. It is easy for companies to reach out to consumers and offer them products or services without a physical storefront. However, this also opens businesses up to the risk of data breaches and cyber attacks. Cyber attacks can be …

Zero Trust Networks: What Are They? Read More »

Read More

AA22-117A: 2021 Top Routinely Exploited Vulnerabilities

Original release date: April 27, 2022 Summary This joint Cybersecurity Advisory (CSA) was coauthored by cybersecurity authorities of the United States, Australia, Canada, New Zealand, and the United Kingdom: the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security …

AA22-117A: 2021 Top Routinely Exploited Vulnerabilities Read More »

Read More

Can Ransomware Spread Through Business WiFi Networks?

Can Ransomware Spread Through WiFi? Ransomware has been a menace to businesses large and small for years, and the problem is only getting worse. One of the most insidious aspects of ransomware is its ability to spread through wifi networks, infecting multiple computers and devices. This can cause severe disruptions to business operations, as employees …

Can Ransomware Spread Through Business WiFi Networks? Read More »

Read More

AA22-110A: Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure

Original release date: April 20, 2022 Summary Actions critical infrastructure organizations should implement to immediately protect against Russian state-sponsored and criminal cyber threats: • Patch all systems. Prioritize patching known exploited vulnerabilities. • Enforce multifactor authentication. • Secure and monitor Remote Desktop Protocol and other risky services. • Provide end-user awareness and training. The cybersecurity …

AA22-110A: Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure Read More »

Read More