Zero to Hero –What’s up with Defender for Endpoint Passive and EDR Block Mode – Complete Guide

Introduction

In many projects, Microsoft Defender for Endpoint is introduced into an already existing security landscape.

From my experience, I most often see MDE being rolled out in environments where a third‑party antivirus or even another EDR solution is already deployed and operational. In these cases, Defender for Endpoint is capable of not directly replace the existing protection immediately, but to integrate alongside it.

A common pattern I encounter is a transition phase, where Defender runs in parallel to the existing AV or EDR solution. This allows security teams to:

  • Gain visibility and telemetry from Defender for Endpoint early on

  • Validate operational processes without cutover migration

  • Then gradually shift towards Defender for Endpoint as the primary solution

Instead of a hard cutover, Defender can be introduced more smoothly

This parallel operation is made possible through Defender for Endpoint’s operational modes and its built‑in antivirus compatibility mechanisms most notably Passive mode and EDR in Block mode.

In this article, we take a closer look at these modes and explain how Defender for Endpoint behaves in such coexistence and transition scenarios.

 

Defender for Endpoint AV Compatibility

In a lot of enterprises, Defender for Endpoint is introduced alongside an existing antivirus or EDR solution, mostly during a migration phase. Instead of enforcing an immediate replacement, Microsoft separates protection into layers, allowing Defender to coexist without causing conflicts.

At a high level, this works because Microsoft distinguishes between:

  • Microsoft Defender Antivirus (AV)
    The local prevention and enforcement engine.

  • Microsoft Defender for Endpoint (MDE)
    The EDR telemetry pipeline, analytics, and response platform.

This separation allows Defender for Endpoint to provide visibility, detection, and investigation, even when Defender AV is not the primary antivirus on the system.

Why running in parallel makes sense (under certain conditions)?

From my experience, parallel operation is one of the most practical ways to introduce Defender for Endpoint into mature environments. This gives the opportunity to smoothly transition to MDE as their primary solution.

Microsoft Defender for Endpoint (Defender EDR) operates in three different modes: Active mode, Passive mode, and EDR Block mode.

Active Mode: In this mode, Defender for Endpoint is fully operational and actively monitors, detects, and responds to threats on endpoints. It provides real-time protection, executes automated investigations, and applies remediation actions to address identified threats. This is the default and most comprehensive mode, ensuring optimal security.

Passive Mode: When running in Passive mode, Defender for Endpoint collects and reports data but does not actively intervene in threat remediation. This mode is typically used in environments where another security solution is already active, allowing Defender for Endpoint to coexist without conflicting with the other solution. It still provides visibility and can be used for monitoring and auditing purposes.

EDR Block Mode: EDR Block mode allows Defender for Endpoint to block malicious activities and files even if the primary antivirus solution misses them. This mode enhances security by leveraging Endpoint Detection and Response (EDR) capabilities to prevent threats that might bypass other defenses. It is recommended to use this mode on top of passive mode alongside the existing antivirus solution to provide an additional layer of protection by blocking high-confidence malicious behaviors and files. It is recommended to enable EDR block mode even though running in active mode, to ensure that all capabilities are in place.

Disabled: When disabled or uninstalled, Microsoft Defender Antivirus isn't used. Files aren't scanned, and threats aren't remediated.

One of the most critical mistakes I see in real environments is running Defender intentionally or unintentionally in Passive Mode without a proper primary security solution in place. Never use passive mode or disabled mode, when there is no 3rd-party AV solution

Comparison of Defender operational states and capabilities

How to check what’s the current AV State

Verify the actual Defender Antivirus state on the endpoint using PowerShell:

Get-MpComputerStatus

The key property to look at is:

AMRunningMode

Values you will encounter when av is enabled:

  • Normal
    Defender Antivirus is running in Active Mode and is the primary AV.

  • Passive Mode
    Defender Antivirus is running in passive mode.

  • EDR Block Mode
    Defender AV is in passive mode, but EDR in Block Mode is enabled and can remediate threats post breach.


Alternatively the status can be observed in the defender portal (security.microsoft.com)

Considerations when running parallel mode

Running Defender for Endpoint side by side with another security solution is supported, but there are a few general things to consider:

Avoid duplicated capabilities

Running multiple tools that perform the same function (for example real‑time scanning or behavioral blocking) can cause performance issues and product conflicts.

Avoid duplicated capabilities and define clear responsibility

Running multiple security tools that perform the same active functions, such as real‑time scanning or behavioral blocking, can lead to performance degradation and product conflicts. In parallel scenarios, there should be one clearly defined master.

Defender for Endpoint can be configured to reduce functional overlap by disabling or limiting capabilities like EDR in Block Mode, automated investigation and remediation, PUA protection, or network discovery and response. Responsibility for these functions should always rest with the solution that actively provides them.

When Microsoft Defender Antivirus is set to Passive Mode, it does not perform active protection or blocking. Malware prevention responsibility shifts entirely to the primary anti‑malware solution.

Configure mutual exclusions (carefully)

Mutual exclusions help avoid performance and compatibility issues, but they also reduce inspection coverage.

When exclusions are in place:

  • Each vendor is trusted to protect its own components

  • Protection gaps must be actively managed as solutions change

Only exclude paths and processes that are well understood and verified.

Generally recommended exclusions for third-party AV when running Defender side-by-side

OS Exclusions

Windows 11

Windows 10, version 1803 or later
(See Windows 10 release information)

Windows 10, version 1703 or 1709
with KB4493441 installed

  • C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe
  • C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe
  • C:\Program Files\Windows Defender Advanced Threat Protection\SenseSampleUploader.exe
  • C:\Program Files\Windows Defender Advanced Threat Protection\SenseIR.exe
  • C:\Program Files\Windows Defender Advanced Threat Protection\SenseCM.exe
  • C:\Program Files\Windows Defender Advanced Threat Protection\SenseNdr.exe
  • C:\Program Files\Windows Defender Advanced Threat Protection\SenseSC.exe
  • C:\Program Files\Windows Defender Advanced Threat Protection\Classification\SenseCE.exe
  • C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\DataCollection
  • C:\Program Files\Windows Defender Advanced Threat Protection\SenseTVM.exe

Windows Server 2022

Windows Server 2019

Windows Server 2016

Windows Server 2012 R2

Windows Server, version 1803

On Windows Server 2012 R2 and Windows Server 2016 running the modern, unified solution, the following exclusions are required after updating the Sense EDR component using KB5005292:

  • C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\MsSense.exe
  • C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseCnCProxy.exe
  • C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseIR.exe
  • C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseCE.exe
  • C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseSampleUploader.exe
  • C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseCM.exe
  • C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\DataCollection
  • C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseTVM.exe

Windows 8.1

Windows 7

Windows Server 2008 R2 SP1

  • C:\Program Files\Microsoft Monitoring Agent\Agent\Health Service State\Monitoring Host Temporary Files 6\45\MsSenseS.exe

Note: Monitoring Host Temporary Files 6\45 can be different numbered subfolders.

  • C:\Program Files\Microsoft Monitoring Agent\Agent\AgentControlPanel.exe
  • C:\Program Files\Microsoft Monitoring Agent\Agent\HealthService.exe
  • C:\Program Files\Microsoft Monitoring Agent\Agent\HSLockdown.exe
  • C:\Program Files\Microsoft Monitoring Agent\Agent\MOMPerfSnapshotHelper.exe
  • C:\Program Files\Microsoft Monitoring Agent\Agent\MonitoringHost.exe
  • C:\Program Files\Microsoft Monitoring Agent\Agent\TestCloudConnection.exe
 

Passive Mode

Defender Passive Mode allows Microsoft Defender Antivirus to run alongside another primary anti‑malware solution without performing real‑time protection or blocking.

When Defender AV enters passive state:

  • It does not provide real‑time protection

  • No active malware blocking or remediation

  • Still collects telemetry data

  • Designed explicitly for coexistence and transition scenarios

  • Endpoint DLP functionalities operate normally

  • Microsoft Defender Antivirus continues to receive updates

  • EDR Block mode is available for post-breach protection

It is a non‑enforcing state, intended to avoid conflicts while another solution is responsible for prevention.

Never use passive mode when there is no 3rd party AV in place. Also never disable capabilities such as real-time protection or cloud delivered protection, even when running passive or edr block mode.

Requirements

  • Device is onboarded to Microsoft Defender for Endpoint

  • Microsoft Defender Antivirus is installed and enabled

  • Windows Security Center Service must be enabled.

  • Supported operating systems:

    • Operating system: Windows 10 or newer; Windows Server 2019 and later, Windows Server, version 1803, or newer, Azure Stack HCI OS, version 23H2 and later or
      (Windows Server 2012 R2 and Windows Server 2016 if onboarded using the modern, unified solution).

    • Windows 7 passive mode is supported only using new deployment tool (limitations might apply)

  • Another non-Microsoft antivirus/antimalware product must be installed and used as the primary antivirus solution.

Note that passive mode is also available for linux and macos. In this article we will focus on windows operating system for configuration and explanation.
If the Windows Security Center Service is disabled on Windows Clients then Microsoft Defender Antivirus can't detect non-Microsoft antivirus installations and will stay Active. This could lead to conflicts between the Microsoft Defender Antivirus and the non-Microsoft Antivirus, as both will attempt to provide active protection. This will impact performance and is not supported.

Enable Passive Mode

Windows Clients (Windows 10 / 11)

On Windows clients, Passive Mode is usually automatic.

  • When a third‑party antivirus is installed and registered with Windows Security Center

  • Defender Antivirus automatically switches to Passive Mode

  • No manual configuration is required in most cases

This behavior only applies after the device is onboarded to Defender for Endpoint.
AV solution Onboarded to MDE AV state
Microsoft Defender AV Yes Active mode
Third-party AV Yes Passive mode (automatically)

Windows Servers

On Windows Server, Passive Mode must be configured explicitly/manually.

Before onboarding the server to Defender for Endpoint, set the following registry key:

Path: HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection Name: ForceDefenderPassiveMode Type: REG_DWORD Value: 1
If you are planning to keep Microsoft Defender Antivirus in passive mode for your Windows Servers, the ForceDefenderPassiveMode setting needs to be set before onboarding the device to Microsoft Defender for Endpoint. On Windows Server 2016 and later, Windows Server, version 1803 or newer, Windows Server 2012 R2 and Azure Stack HCI OS, version 23H2 and later, Microsoft Defender Antivirus doesn't enter passive mode automatically when you install a non-Microsoft antivirus product. In those cases, set Microsoft Defender Antivirus to passive mode to prevent problems caused by having multiple antivirus products installed on a server.
Beginning with platform version 4.18.2208.0 and later, if a server is onboarded to Microsoft Defender for Endpoint, tamper protection allows a switch to active mode, but not to passive mode. Notice the modified logic for ForceDefenderPassiveMode when tamper protection is enabled: When Microsoft Defender Antivirus is set to active mode, tamper protection prevents it from going back into passive mode even when ForceDefenderPassiveMode is set to 1.

EDR Block Mode

What is EDR in Block Mode

Endpoint Detection and Response (EDR) in block mode provides post-breach protection mainly on devices where Microsoft Defender Antivirus is not the primary AV and is running in passive mode.
This typically applies to environments where a third-party antivirus solution is active.

EDR in block mode allows Defender for Endpoint to actively remediate threats based on EDR detections, even if the primary antivirus missed them. In other words, Defender can still block and clean up a bit.

But…! EDR in block mode does not replace full active protection. Capabilities such as real-time scanning, Attack Surface Reduction (ASR) rules, and Network Protection … only work when Defender Antivirus runs in active mode!

Requirements

  • Microsoft Defender for Endpoint Plan 2

  • Operating system: Windows 10 or newer; Windows Server 2019 and later, Windows Server, version 1803, or newer, (Windows Server 2012 R2 and Windows Server 2016 if onboarded using the modern, unified solution).

  • Device must be onboarded to Microsoft Defender for Endpoint

  • Microsoft Defender Antivirus must be installed and running in active or passive mode

  • Cloud-delivered protection(MAPS) must be enabled

  • Defender platform version ≥ 4.18.2001.10 & Defender engine version ≥ 1.1.16700.2

Also with EDR Block mode enabled it is crucial to make sure that the AV receives regular updates. From my experience this is often forgotten or overlooked when using passive+edrblock mode.

Enable EDRBlock Mode

EDR in block mode can be enabled tenant-wide or per targettted, depending on the configuration method.

Enable via Microsoft Defender Portal (recommended)

1.       Go to https://security.microsoft.com

2.       Navigate to: Settings → Endpoints → General → Advanced features

3.       Enable EDR in block mode

Enable via Microsoft Intune (CSP/OMA-URI)

EDR in block mode can be targeted to specific device groups using the Intune CSP:

  • CSP path: ./Device/Vendor/MSFT/Defender/Configuration/PassiveRemediation

  • Use a custom Intune policy (OMA-URI)

For more information about CSP path take a look at: Defender CSP | Microsoft Learn

This option is available starting with Defender platform version 4.18.2202.X.

Enable via Group Policy

  1. Open Group Policy Management Console

  2. Navigate to:
    Computer Configuration → Administrative Templates → Windows Components → Microsoft Defender Antivirus → Features

  3. Set Enable EDR in block mode to Enabled

  4. Apply the policy

 

Conclusion

Microsoft Defender for Endpoint can work well in parallel with other security solutions, if you understand the operating modes.

Passive Mode enables coexistence, but provides no active protection.

EDR in Block Mode adds post‑breach enforcement, but not full capabilities.

Active Mode is the only state where Defender delivers complete protection.

From my experience, problems arise when teams assume protection without verifying the actual state.

Always be clear about who detects, who blocks, and who owns prevention.

If that is well defined, Defender for Endpoint becomes a reliable and predictable part of your security architecture.

Next
Next

What’s new in DefenderXDR? 03/26