Skip to Content

How to Access Windows Defender Threat History Using URIs

Learn how to access Windows Defender threat history using URIs in this article. We will show you the steps to create shortcuts to different Windows Defender pages using explorer commands.

Windows Defender is a built-in antivirus software that protects your Windows 10 device from malware, viruses, and other threats. However, sometimes you may want to view the details of the threats that Windows Defender has detected and removed, or the ones that you have allowed or excluded. In this article, we will show you how to access Windows Defender threat history using URIs, which are unique identifiers for different Windows Defender pages. We will also provide you with a list of URIs for various Windows Defender pages that you can use to create shortcuts or run commands.

What are URIs and how to use them?

URIs, or Uniform Resource Identifiers, are strings of characters that identify a resource on a network. They can be used to access web pages, files, folders, or other resources.

To use URIs to access Windows Defender pages, you need to use the explorer command, which opens a File Explorer window with the specified path or location. For example, to open the Windows Defender main page, you can use the following command:

explorer windowsdefender:

To run this command, you can either use the Run dialog box (press Windows + R keys), the Command Prompt, or the PowerShell. Alternatively, you can create a shortcut on your desktop or any other location by right-clicking on an empty space, selecting New > Shortcut, and entering the command in the location field.

How to access Windows Defender threat history using URIs?

To access Windows Defender threat history using URIs, you need to use the following command:

explorer windowsdefender://History

This will open the Protection history page, where you can see the details of the threats that Windows Defender has detected, blocked, quarantined, allowed, or excluded. You can also filter the history by date, severity, or category.

What are the other URIs for Windows Defender pages?

Besides the threat history page, there are other URIs for different Windows Defender pages that you can use to access them quickly and easily. Here is a list of some of the URIs for Windows Defender pages, along with their descriptions:

  • explorer windowsdefender://Threat – Opens the Virus & threat protection page, where you can scan your device, manage settings, and view current threats.
  • explorer windowsdefender://ThreatSettings – Opens the Virus & threat protection settings page, where you can configure real-time protection, cloud-delivered protection, tamper protection, and other options.
  • explorer windowsdefender://Account – Opens the Account protection page, where you can sign in with a Microsoft account, manage dynamic lock, and view account health.
  • explorer windowsdefender://Network – Opens the Firewall & network protection page, where you can manage firewall settings, network profiles, and troubleshoot network problems.
  • explorer windowsdefender://Hardware – Opens the Device security page, where you can view security processor details, security processor troubleshooting, and core isolation details.
  • explorer windowsdefender://DeviceSecurity – Opens the Device security page, where you can view security processor details, security processor troubleshooting, and core isolation details.
  • explorer windowsdefender://Family – Opens the Family options page, where you can set up parental controls, screen time, and activity reports for your family members.
  • explorer windowsdefender://AppBrowser – Opens the App & browser control page, where you can manage SmartScreen settings, exploit protection settings, and reputation-based protection settings.
  • explorer windowsdefender://Settings – Opens the Manage notifications page, where you can customize the notifications that Windows Defender sends you.
  • explorer windowsdefender://RansomwareProtection – Opens the Ransomware protection page, where you can enable controlled folder access, allow an app through controlled folder access, and restore files from ransomware attacks.
  • explorer windowsdefender://ProtectedFolders – Opens the Protected folders page, where you can view and modify the folders that are protected by controlled folder access.
  • explorer windowsdefender://SecurityProcessor – Opens the Security processor details page, where you can view the information about your security processor, such as manufacturer, version, status, and health.
  • explorer windowsdefender://SecurityProcessorTroubleshooting – Opens the Security processor troubleshooting page, where you can clear your security processor keys, reset your security processor, or view your security processor logs.
  • explorer windowsdefender://SmartScreenPua – Opens the Smart Screen (Reputation-based protection) page, where you can enable or disable the protection from potentially unwanted apps (PUAs).
  • explorer windowsdefender://AccountProtection – Opens the Account protection page, where you can sign in with a Microsoft account, manage dynamic lock, and view account health.
  • explorer windowsdefender://ExploitProtection – Opens the Exploit protection page, where you can configure system settings and program settings to protect your device from common exploits.
  • explorer windowsdefender://exclusions – Opens the Exclusions page, where you can add or remove files, folders, file types, or processes that you want Windows Defender to exclude from scanning and protection.
  • explorer windowsdefender://fullscan – Starts a full scan of your device with Windows Defender.
  • explorer windowsdefender://quickscan – Starts a quick scan of your device with Windows Defender.

Frequently Asked Questions (FAQs)

Question: How do I find the URIs for Windows Defender pages?

Answer: There is no official documentation from Microsoft that lists all the URIs for Windows Defender pages. However, you can use a tool called UI Recorder, which can capture the UI elements and actions of any Windows application, and generate the corresponding URIs for them.

Question: How do I create a shortcut to a Windows Defender page using a URI?

Answer: To create a shortcut to a Windows Defender page using a URI, follow these steps:

  1. Right-click on an empty space on your desktop or any other location, and select New > Shortcut.
  2. In the Create Shortcut dialog box, enter the explorer command with the URI of the Windows Defender page that you want to open, for example, explorer windowsdefender://History.
  3. Click Next, and give a name to your shortcut, for example, Windows Defender Threat History.
  4. Click Finish, and you will see a shortcut icon on your desktop or the location that you chose.
  5. Double-click on the shortcut icon to open the Windows Defender page.

Question: How do I run a command to open a Windows Defender page using a URI?

Answer: To run a command to open a Windows Defender page using a URI, follow these steps:

  1. Press Windows + R keys to open the Run dialog box, or open the Command Prompt or the PowerShell from the Start menu or the search box.
  2. In the Run dialog box, Command Prompt, or PowerShell, enter the explorer command with the URI of the Windows Defender page that you want to open, for example, explorer windowsdefender://History.
  3. Press Enter, and the Windows Defender page will open in a new window.

Summary

In this article, we have shown you how to access Windows Defender threat history using URIs, which are unique identifiers for different Windows Defender pages. We have also provided you with a list of URIs for various Windows Defender pages that you can use to create shortcuts or run commands. We hope that this article has helped you to learn more about Windows Defender and how to use it effectively.

Disclaimer: This article is for informational purposes only and does not constitute professional advice. We are not affiliated with Microsoft or Windows Defender in any way. We do not guarantee the accuracy, completeness, or validity of the information provided in this article. You should always consult a qualified IT professional before making any changes to your system or software.