[Understanding ADMX-backed policies](understanding-admx-backed-policies.md) |
Added the following videos:
diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md
index 6f733c2214..204daddb5b 100644
--- a/windows/client-management/mdm/policy-configuration-service-provider.md
+++ b/windows/client-management/mdm/policy-configuration-service-provider.md
@@ -498,6 +498,9 @@ The following diagram shows the Policy configuration service provider in tree fo
-
Browser/PreventSmartScreenPromptOverrideForFiles
+ -
+ Browser/PreventTabPreloading
+
-
Browser/PreventUsingLocalHostIPAddressForWebRTC
diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md
index ccafd7cbed..79d91ff2dc 100644
--- a/windows/client-management/mdm/policy-csp-browser.md
+++ b/windows/client-management/mdm/policy-csp-browser.md
@@ -6,7 +6,7 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: nickbrower
-ms.date: 03/12/2018
+ms.date: 03/13/2018
---
# Policy CSP - Browser
@@ -117,6 +117,9 @@ ms.date: 03/12/2018
-
Browser/PreventSmartScreenPromptOverrideForFiles
+ -
+ Browser/PreventTabPreloading
+
-
Browser/PreventUsingLocalHostIPAddressForWebRTC
@@ -2150,6 +2153,58 @@ The following list shows the supported values:
+
+**Browser/PreventTabPreloading**
+
+
+
+
+ Home |
+ Pro |
+ Business |
+ Enterprise |
+ Education |
+ Mobile |
+ Mobile Enterprise |
+
+
+  |
+ 4 |
+ 4 |
+ 4 |
+ 4 |
+ |
+ |
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * User
+> * Device
+
+
+
+
+
+Added in Windows 10, version 1803. This is only a placeholder. Do not use in production code.
+
+
+
+
+The following list shows the supported values:
+
+- 0 (default) – Allow pre-launch and preload.
+- 1 – Prevent pre-launch and preload.
+
+
+
+
+
+
**Browser/PreventUsingLocalHostIPAddressForWebRTC**
diff --git a/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md
index b30883b882..9f225964af 100644
--- a/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md
+++ b/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md
@@ -50,7 +50,7 @@ PUAs are blocked when a user attempts to download or install the detected file,
- The file is being scanned from the browser
- The file is in a folder with "**downloads**" in the path
- The file is in a folder with "**temp**" in the path
-- The file is on the user's Dekstop
+- The file is on the user's Desktop
- The file does not meet one of these conditions and is not under *%programfiles%*, *%appdata%*, or *%windows%*
The file is placed in the quarantine section so it won't run.
|