mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-22 22:03:46 +00:00
Name fixes
This commit is contained in:
@ -625,7 +625,7 @@ This policy setting controls whether or not exclusions are visible to Local Admi
|
||||
|
||||
If you disable or do not configure this setting, Local Admins will be able to see exclusions in the Windows Security App and via PowerShell.
|
||||
|
||||
If you enable this setting, Local Admins will no longer be able to see the exclusion list in Windows Security App or via PowerShell.
|
||||
If you enable this setting, Local Admins will no longer be able to see the exclusion list in the Windows Security app or via PowerShell.
|
||||
|
||||
> [!NOTE]
|
||||
> Applying this setting will not remove exclusions, it will only prevent them from being visible to Local Admins. This is reflected in **Get-MpPreference**.
|
||||
|
@ -246,10 +246,10 @@ Added in Windows, version 1607. Integer that specifies the status of the antisp
|
||||
|
||||
Valid values:
|
||||
|
||||
- 0 - The status of the security provider category is good and does not need user attention.
|
||||
- 1 - The status of the security provider category is not monitored by Windows Security Center (WSC).
|
||||
- 2 - The status of the security provider category is poor and the computer may be at risk.
|
||||
- 3 - The security provider category is in snooze state. Snooze indicates that WSC is not actively protecting the computer.
|
||||
- 0 - The status of the security provider category is good and does not need user attention.
|
||||
- 1 - The status of the security provider category is not monitored by Windows Security.
|
||||
- 2 - The status of the security provider category is poor and the computer may be at risk.
|
||||
- 3 - The security provider category is in snooze state. Snooze indicates that the Windows Security Service is not actively protecting the computer.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
|
@ -3564,7 +3564,7 @@ The options are:
|
||||
- 0 - Disabled: Admin Approval Mode and all related UAC policy settings are disabled.
|
||||
|
||||
> [!NOTE]
|
||||
> If this policy setting is disabled, the Windows Security Center notifies you that the overall security of the operating system has been reduced.
|
||||
> If this policy setting is disabled, Windows Security notifies you that the overall security of the operating system has been reduced.
|
||||
|
||||
- 1 - Enabled: (Default) Admin Approval Mode is enabled. This policy must be enabled and related UAC policy settings must also be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.
|
||||
|
||||
|
Reference in New Issue
Block a user