mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 14:57:23 +00:00
Merge remote-tracking branch 'refs/remotes/origin/master' into live
This commit is contained in:
commit
14b6a7413f
@ -1139,6 +1139,6 @@
|
|||||||
"source_path": "windows/whats-new/security.md",
|
"source_path": "windows/whats-new/security.md",
|
||||||
"redirect_url": "/itpro/windows/keep-secure/overview-of-threat-mitigations-in-windows-10",
|
"redirect_url": "/itpro/windows/keep-secure/overview-of-threat-mitigations-in-windows-10",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -92,10 +92,11 @@ Health Status for onboarded machines: Sense Is Running | ./Device/Vendor/MSFT/Wi
|
|||||||
Health Status for onboarded machines: Onboarding State | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/HealthState/OnBoardingState | Integer | 1 | Onboarded to Windows Defender ATP
|
Health Status for onboarded machines: Onboarding State | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/HealthState/OnBoardingState | Integer | 1 | Onboarded to Windows Defender ATP
|
||||||
Health Status for onboarded machines: Organization ID | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/HealthState/OrgId | String | Use OrgID from onboarding file | Onboarded to Organization ID
|
Health Status for onboarded machines: Organization ID | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/HealthState/OrgId | String | Use OrgID from onboarding file | Onboarded to Organization ID
|
||||||
Configuration for onboarded machines | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Configuration/SampleSharing | Integer | 0 or 1 <br> Default value: 1 | Windows Defender ATP Sample sharing is enabled
|
Configuration for onboarded machines | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Configuration/SampleSharing | Integer | 0 or 1 <br> Default value: 1 | Windows Defender ATP Sample sharing is enabled
|
||||||
|
Configuration for onboarded machines: telemetry reporting frequency | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Configuration/TelemetryReportingFrequency | Integer | 1 or 2 <br> 1: Normal (default)<br><br> 2: Expedite | Windows Defender ATP telemetry reporting
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> The **Health Status for onboarded machines** policy uses read-only properties and can't be remediated.
|
> - The **Health Status for onboarded machines** policy uses read-only properties and can't be remediated.
|
||||||
|
> - Configuration of telemetry reporting frequency is only available for machines on Windows 10, version 1703.
|
||||||
|
|
||||||
### Offboard and monitor endpoints
|
### Offboard and monitor endpoints
|
||||||
|
|
||||||
|
@ -18,9 +18,6 @@ localizationpriority: high
|
|||||||
|
|
||||||
Windows Defender SmartScreen helps to protect your employees if they try to visit sites previously reported as phishing or malware websites, or if an employee tries to download potentially malicious files.
|
Windows Defender SmartScreen helps to protect your employees if they try to visit sites previously reported as phishing or malware websites, or if an employee tries to download potentially malicious files.
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>SmartScreen completely blocks apps from the Internet from running on Windows 10 Mobile.
|
|
||||||
|
|
||||||
**SmartScreen determines whether a site is potentially malicious by:**
|
**SmartScreen determines whether a site is potentially malicious by:**
|
||||||
|
|
||||||
- Analyzing visited webpages looking for indications of suspicious behavior. If it finds suspicious pages, SmartScreen shows a warning page, advising caution.
|
- Analyzing visited webpages looking for indications of suspicious behavior. If it finds suspicious pages, SmartScreen shows a warning page, advising caution.
|
||||||
@ -53,7 +50,7 @@ Windows Defender SmartScreen helps to provide an early warning system against we
|
|||||||
When Windows Defender SmartScreen warns or blocks an employee from a website, it's logged as [Event 1035 - Anti-Phishing](https://technet.microsoft.com/en-us/scriptcenter/dd565657(v=msdn.10).aspx).
|
When Windows Defender SmartScreen warns or blocks an employee from a website, it's logged as [Event 1035 - Anti-Phishing](https://technet.microsoft.com/en-us/scriptcenter/dd565657(v=msdn.10).aspx).
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [SmartScreen Frequently Asked Questions (FAQ)](https://support.microsoft.com/en-us/products/windows?os=windows-10)
|
- [SmartScreen Frequently Asked Questions (FAQ)](https://feedback.smartscreen.microsoft.com/smartscreenfaq.aspx)
|
||||||
|
|
||||||
- [How to recognize phishing email messages, links, or phone calls](https://www.microsoft.com/en-us/safety/online-privacy/phishing-symptoms.aspx)
|
- [How to recognize phishing email messages, links, or phone calls](https://www.microsoft.com/en-us/safety/online-privacy/phishing-symptoms.aspx)
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user