mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-28 13:17:23 +00:00
Merge pull request #4875 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
This commit is contained in:
commit
18f221dcb0
@ -64,10 +64,10 @@ To find your CommercialID within Azure:
|
||||
|
||||
## Enroll devices in Update Compliance
|
||||
|
||||
Once you've added Update Compliance to a workspace in your Azure subscription, you'll need to configure any devices you want to monitor. There are two ways to configure devices to use Update Compliance.
|
||||
Once you've added Update Compliance to a workspace in your Azure subscription, you'll need to configure any devices you want to monitor. There are two ways to configure devices to use Update Compliance. After you configure devices, it can take up to 72 hours before devices are visible in the solution. Until then, Update Compliance will indicate it is still assessing devices.
|
||||
|
||||
> [!NOTE]
|
||||
> After configuring devices via one of the two methods below, it can take up to 72 hours before devices are visible in the solution. Until then, Update Compliance will indicate it is still assessing devices.
|
||||
> If you use or plan to use [Desktop Analytics](https://docs.microsoft.com/mem/configmgr/desktop-analytics/overview), follow the steps in [Enroll devices in Desktop Analytics](https://docs.microsoft.com/mem/configmgr/desktop-analytics/enroll-devices) to also enroll devices in Update Compliance. You should be aware that the Commercial ID and Log Analytics workspace must be the same for both Desktop Analytics and Update Compliance.
|
||||
|
||||
### Configure devices using the Update Compliance Configuration Script
|
||||
|
||||
|
@ -12,7 +12,7 @@ author: denisebmsft
|
||||
ms.author: deniseb
|
||||
ms.reviewer: jcedola, dbodorin, vladiso, nixanm, anvascon
|
||||
manager: dansimp
|
||||
ms.date: 01/06/2021
|
||||
ms.date: 03/10/2021
|
||||
ms.technology: mde
|
||||
---
|
||||
|
||||
@ -130,6 +130,7 @@ An allowed application or service only has write access to a controlled folder a
|
||||
### Use PowerShell to allow specific apps
|
||||
|
||||
1. Type **PowerShell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**
|
||||
|
||||
2. Enter the following cmdlet:
|
||||
|
||||
```PowerShell
|
||||
@ -158,7 +159,7 @@ Use the [./Vendor/MSFT/Policy/Config/Defender/GuardedFoldersAllowedApplications]
|
||||
Microsoft Defender for Endpoint certificate and file indicators can allow signed executable files to access protected folders. For implementation details, see [Create indicators based on certificates](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates).
|
||||
|
||||
> [!Note]
|
||||
> This does no apply to scripting engines, including Powershell
|
||||
> This does not apply to scripting engines, including PowerShell.
|
||||
|
||||
## Customize the notification
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user