update images with alt text

This commit is contained in:
Iaan D'Souza-Wiltshire
2017-10-02 14:08:30 -07:00
parent 577d7ab276
commit 168df70a2e
6 changed files with 10 additions and 10 deletions

View File

@ -73,7 +73,7 @@ You can also manually navigate to the event area that corresponds to the Windows
3. On the left panel, under **Actions**, click **Create Custom View...**
![Animation highlighting the create cusomt view option on the Event viewer window ](images/events-create.gif)
![Animation highlighting the create custom view option on the Event viewer window ](images/events-create.gif)
4. Go to the XML tab and click **Edit query manually**. You'll see a warning that you won't be able to edit the query using the **Filter** tab if you use the XML option. Click **Yes**.

View File

@ -76,7 +76,7 @@ You can review the Windows event log to see events that are created when Exploit
3. On the left panel, under **Actions**, click **Import custom view...**
![](images/events-import.gif)
![Antimated GIF highlighting the import custom view button on the right pane ](images/events-import.gif)
4. Navigate to where you extracted *ep-events.xml* and select it. Alternatively, [copy the XML directly](event-views-exploit-guard.md).

View File

@ -66,16 +66,16 @@ When you have configured Exploit protection to your desired state (including bot
### Use the Windows Defender Security Center app to export a configuration file
1. Open the Windows Defender Security Center by clicking the shield icon in the task bar or searching the start menu for **Defender**.
1. Open the Windows Defender Security Center app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
2. Click the **App & browser control** tile (or the app icon on the left menu bar) and then click **Exploit protection settings**:
![](images/wdsc-exp-prot.png)
![Highlight of the Exploit protection settings option in the Windows Defender Security Center app](images/wdsc-exp-prot.png)
3. At the bottom of the **Exploit protection** section, click **Export settings** and then choose the location and name of the XML file where you want the configuration to be saved.
![](images/wdsc-exp-prot-export.png)
![Highlight of the Export Settings option](images/wdsc-exp-prot-export.png)
>[!NOTE]
>When you export the settings, all settings for both app-level and system-level mitigations are saved. This means you don't need to export a file from both the **System settings** and **Program settings** sections - either section will export all settings.
@ -151,7 +151,7 @@ You can use Group Policy to deploy the configuration you've created to multiple
5. Expand the tree to **Windows components > Windows Defender Exploit Guard > Exploit protection**.
![](images/exp-prot-gp.png)
![Screenshot of the group policy setting for exploit protection](images/exp-prot-gp.png)
6. Double-click the **Use a common set of Exploit protection settings** setting and set the option to **Enabled**.

View File

@ -70,7 +70,7 @@ You can review the Windows event log to see events that are created when Network
2. On the left panel, under **Actions**, click **Import custom view...**
![](images/events-import.gif)
![Antimation of the import custom view option](images/events-import.gif)
3. Navigate to the Exploit Guard Evaluation Package, and select the file *np-events.xml*. Alternatively, [copy the XML directly](event-views-exploit-guard.md).