Summary
The first hours of a newly installed Windows deployment can leave the system vulnerable because of a Microsoft Defender protection gap. This is because the OS installation images may contain outdated antimalware software binaries.
The devices on which these deployments are made are inadequately protected until they receive the first antimalware software update. Defender updates also contain critical performance fixes that will improve the user experience. Devices using either the Windows built-in antivirus or another security solution can benefit from these updates. We recommend you regularly service OS installation images to update Microsoft Defender binaries and minimize this protection gap in new deployments. A 3-month update frequency is recommended.
No ordering is required to apply the latest cumulative update (LCU) versus the Microsoft Defender update offline.
This article describes antimalware update package for Microsoft Defender in the OS installation images (WIM and VHD files). This feature supports the following OS installation images:
- Windows 11
- Windows 10 (Enterprise, Pro, and Home editions)
- Windows Server 2019
- Windows Server 2016
Version information
Note
- Defender package version: 20230503.1
This package updates the anti-malware client, anti-malware engine, and signature versions in the OS installation images to following versions:
- Platform version: 4.18.2304.8
- Engine version: 1.1.20300.3
- Security intelligence version: 1.389.44.0
Package information
The package size is approximately:
- ARM64: 69 MB
- X86: 113 MB
- X64: 116 MB
Known issues in this update
None
Update information
This package includes monthly updates and fixes to the Microsoft Defender antimalware platform and engine that is used by Microsoft Defender Antivirus in Windows 11. This package should be applied offline on Windows Images/VHD(x) file.
Learn more about the package contents here:
Manage Microsoft Defender Antivirus updates and apply baselines | Microsoft Learn
This package also includes the latest security intelligence update that is available up to the date of release. Learn more about security intelligence updates including the release notes
here.
How to obtain this update
Different update packages are required for different Windows OS image architectures. Select the architecture that matches the installation image to which you will apply this update:
Microsoft Defender update for Windows Operating system installation image:
32-bit |
64-bit |
ARM64
Note: These links point to
defender-update-kit-[x86|x64|arm].zip. Extract this .zip file to get the Defender update package (
defender-dism-[x86|x64|arm].cab) and an update patching tool (
DefenderUpdateWinimage.ps1) that assists the update operation for OS installation images.
Package update tool
The following prerequisites apply to running this patching tool (
DefenderUpdateWinImage.ps1):
- You must be running a 64-bit Windows 10 or later OS environment that includes PowerShell 5.1 or a later version.
- The Microsoft.Powershell.Security and DISM modules must be installed.
- You must start PowerShell on the device by using administrator privileges.
Note
- Do not use this package to update live images because it can damage the Windows installation that Is running inside the Virtual Machine.
- The DefenderUpdateWinImage.ps1 tool provides an option to remove the update. However, you may still want to keep a backup copy of images before you apply the update.
How to apply this update
PS C:\>
DefenderUpdateWinImage.ps1 -WorkingDirectory <path> -Action AddUpdate -ImagePath <path_to_Os_Image> -Package
How to remove or roll back this update
PS C:\>
DefenderUpdateWinImage.ps1 -WorkingDirectory <path> -Action RemoveUpdate -ImagePath <path_to_Os_Image>
How to list the details of installed update
PS C:\>
DefenderUpdateWinImage.ps1 -WorkingDirectory <path> -Action ShowUpdate -ImagePath <path_to_Os_Image>
References
Learn about the
terminology that Microsoft uses to describe software updates.