mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 12:23:37 +00:00
Merge pull request #2678 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
This commit is contained in:
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Reclaim seat from user
|
title: Reclaim seat from user
|
||||||
description: The Reclaim seat from user operation returns reclaimed seats for a user in the Micosoft Store for Business.
|
description: The Reclaim seat from user operation returns reclaimed seats for a user in the Microsoft Store for Business.
|
||||||
ms.assetid: E2C3C899-D0AD-469A-A319-31A420472A4C
|
ms.assetid: E2C3C899-D0AD-469A-A319-31A420472A4C
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
@ -9,12 +9,12 @@ ms.topic: article
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: manikadhiman
|
author: manikadhiman
|
||||||
ms.date: 09/18/2017
|
ms.date: 05/05/2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Reclaim seat from user
|
# Reclaim seat from user
|
||||||
|
|
||||||
The **Reclaim seat from user** operation returns reclaimed seats for a user in the Micosoft Store for Business.
|
The **Reclaim seat from user** operation returns reclaimed seats for a user in the Microsoft Store for Business.
|
||||||
|
|
||||||
## Request
|
## Request
|
||||||
|
|
||||||
|
@ -17,7 +17,7 @@ audience: ITPro
|
|||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# Enable network protection
|
# Turning on network protection
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
@ -26,6 +26,21 @@ manager: dansimp
|
|||||||
[Network protection](network-protection.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
|
[Network protection](network-protection.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
|
||||||
You can [audit network protection](evaluate-network-protection.md) in a test environment to see which apps would be blocked before you enable it.
|
You can [audit network protection](evaluate-network-protection.md) in a test environment to see which apps would be blocked before you enable it.
|
||||||
|
|
||||||
|
## Check if network protection is enabled
|
||||||
|
|
||||||
|
You can see if network protection has been enabled on a local device by using Registry editor.
|
||||||
|
|
||||||
|
1. Select the **Start** button in the task bar and type **regedit** to open Registry editor
|
||||||
|
1. Choose **HKEY_LOCAL_MACHINE** from the side menu
|
||||||
|
1. Navigate through the nested menus to **SOFTWARE** > **Policies** > **Microsoft** **Windows Defender** > **Policy Manager**
|
||||||
|
1. Select **EnableNetworkProtection** to see the current state of network protection on the device
|
||||||
|
|
||||||
|
* 0, or **Off**
|
||||||
|
* 1, or **On**
|
||||||
|
* 2, or **Audit** mode
|
||||||
|
|
||||||
|
## Enable network protection
|
||||||
|
|
||||||
You can enable network protection by using any of these methods:
|
You can enable network protection by using any of these methods:
|
||||||
|
|
||||||
* [PowerShell](#powershell)
|
* [PowerShell](#powershell)
|
||||||
@ -34,7 +49,7 @@ You can enable network protection by using any of these methods:
|
|||||||
* [Microsoft Endpoint Configuration Manager](#microsoft-endpoint-configuration-manager)
|
* [Microsoft Endpoint Configuration Manager](#microsoft-endpoint-configuration-manager)
|
||||||
* [Group Policy](#group-policy)
|
* [Group Policy](#group-policy)
|
||||||
|
|
||||||
## PowerShell
|
### PowerShell
|
||||||
|
|
||||||
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and click **Run as administrator**
|
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and click **Run as administrator**
|
||||||
2. Enter the following cmdlet:
|
2. Enter the following cmdlet:
|
||||||
@ -51,10 +66,7 @@ Set-MpPreference -EnableNetworkProtection AuditMode
|
|||||||
|
|
||||||
Use `Disabled` instead of `AuditMode` or `Enabled` to turn the feature off.
|
Use `Disabled` instead of `AuditMode` or `Enabled` to turn the feature off.
|
||||||
|
|
||||||
|
### Intune
|
||||||
|
|
||||||
|
|
||||||
## Intune
|
|
||||||
|
|
||||||
1. Sign in to the [Azure portal](https://portal.azure.com) and open Intune.
|
1. Sign in to the [Azure portal](https://portal.azure.com) and open Intune.
|
||||||
1. Click **Device configuration** > **Profiles** > **Create profile**.
|
1. Click **Device configuration** > **Profiles** > **Create profile**.
|
||||||
@ -65,7 +77,7 @@ Use `Disabled` instead of `AuditMode` or `Enabled` to turn the feature off.
|
|||||||
1. Click **OK** to save each open blade and click **Create**.
|
1. Click **OK** to save each open blade and click **Create**.
|
||||||
1. Click the profile **Assignments**, assign to **All Users & All Devices**, and click **Save**.
|
1. Click the profile **Assignments**, assign to **All Users & All Devices**, and click **Save**.
|
||||||
|
|
||||||
## MDM
|
### MDM
|
||||||
|
|
||||||
Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-enablenetworkprotection) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
|
Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-enablenetworkprotection) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
|
||||||
|
|
||||||
@ -78,13 +90,13 @@ Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](https://d
|
|||||||
1. Review the settings and click **Next** to create the policy.
|
1. Review the settings and click **Next** to create the policy.
|
||||||
1. After the policy is created, click **Close**.
|
1. After the policy is created, click **Close**.
|
||||||
|
|
||||||
## Group Policy
|
### Group Policy
|
||||||
|
|
||||||
You can use the following procedure to enable network protection on domain-joined computers or on a standalone computer.
|
You can use the following procedure to enable network protection on domain-joined computers or on a standalone computer.
|
||||||
|
|
||||||
1. On a standalone computer, click **Start**, type and then click **Edit group policy**.
|
1. On a standalone computer, click **Start**, type and then click **Edit group policy**.
|
||||||
|
|
||||||
-Or-
|
*-Or-*
|
||||||
|
|
||||||
On a domain-joined Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
|
On a domain-joined Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
|
||||||
|
|
||||||
@ -109,7 +121,6 @@ You can confirm network protection is enabled on a local computer by using Regis
|
|||||||
* 1=On
|
* 1=On
|
||||||
* 2=Audit
|
* 2=Audit
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
* [Network protection](network-protection.md)
|
* [Network protection](network-protection.md)
|
||||||
|
Reference in New Issue
Block a user