mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 06:47:21 +00:00
minor changes
This commit is contained in:
parent
a153eb774e
commit
00f2ed7053
@ -27,11 +27,11 @@ ms.date: 04/16/2018
|
||||
|
||||
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink)
|
||||
|
||||
Create a rule to control which entities are automatically incriminated or exonerated during automated investigations.
|
||||
Create a rule to control which entities are automatically incriminated or exonerated during Automated investigations.
|
||||
|
||||
Entities added to the allowed list are considered safe and will not be analyzed during automated investigations.
|
||||
Entities added to the allowed list are considered safe and will not be analyzed during Automated investigations.
|
||||
|
||||
Entities added to the blocked list are considered malicious and will be remediated during automated investigations.
|
||||
Entities added to the blocked list are considered malicious and will be remediated during Automated investigations.
|
||||
|
||||
You can define the conditions for when entities are identified as malicious or safe based on certain attributes such as hash values or certificates.
|
||||
|
||||
|
@ -27,11 +27,11 @@ ms.date: 04/16/2018
|
||||
|
||||
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationefileuploads-abovefoldlink)
|
||||
|
||||
Enable the content analysis capability so that certain files and email attachments can automatically be uploaded to the cloud for additional inspection during automated investigations.
|
||||
Enable the content analysis capability so that certain files and email attachments can automatically be uploaded to the cloud for additional inspection in Automated investigation.
|
||||
|
||||
Identify the files and email attachments by specifying the file extension names and email attachment extension names.
|
||||
|
||||
For example, if you add *exe* and *bat* as file or attachment extension names, then all files or attachments with those extensions will automatically be sent to the cloud for additional inspection during an automated investigation.
|
||||
For example, if you add *exe* and *bat* as file or attachment extension names, then all files or attachments with those extensions will automatically be sent to the cloud for additional inspection during Automated investigation.
|
||||
|
||||
## Add file extension names and attachment extension names.
|
||||
|
||||
|
@ -27,7 +27,7 @@ ms.date: 04/16/2018
|
||||
|
||||
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionfolder-abovefoldlink)
|
||||
|
||||
Automation folder exclusions allow you to specify folders that the automated investigation will skip.
|
||||
Automation folder exclusions allow you to specify folders that the Automated investigation will skip.
|
||||
|
||||
You can control the following attributes about the folder that you'd like to be skipped:
|
||||
- Folders
|
||||
@ -35,13 +35,13 @@ You can control the following attributes about the folder that you'd like to be
|
||||
- File names
|
||||
|
||||
|
||||
**Folders**
|
||||
**Folders**<br>
|
||||
You can specify a folder and its subfolders to be skipped. You can use wild cards so that all files under the directory is skipped by the automated investigation.
|
||||
|
||||
**Extensions**
|
||||
**Extensions**<br>
|
||||
You can specify the extensions to exclude in a specific directory. The extensions are a way to prevent an attacker from using an excluded folder to hide an exploit. The extensions explicitly define which files to ignore.
|
||||
|
||||
**File names**
|
||||
**File names**<br>
|
||||
You can specify the file names that you want to be excluded in a specific directory. The names are a way to prevent an attacker from using an excluded folder to hide an exploit. The names explicitly define which files to ignore.
|
||||
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user