mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 03:43:39 +00:00
Update defender-endpoint-false-positives-negatives.md
This commit is contained in:
@ -57,12 +57,23 @@ Depending on the apps your organization is using, you might be getting false pos
|
||||
#### Use Microsoft Endpoint Manager to edit PUA protection for existing configuration profiles
|
||||
|
||||
1. Go to the Microsoft Endpoint Manager admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign in.
|
||||
2. Choose **Devices** > **Configuration profiles**, and then select an existing policy. (If you don’t have an existing policy, or you want to create a new policy, skip to the next procedure).
|
||||
2. Choose **Devices** > **Configuration profiles**, and then select an existing policy. (If you don’t have an existing policy, or you want to create a new policy, skip to [the next procedure](#use-microsoft-endpoint-manager-to-set-pua-protection-for-a-new-configuration-profile)).
|
||||
3. Under **Manage**, choose **Properties**, and then, next to **Configuration settings**, choose **Edit**.
|
||||
4. On the **Configuration settings** tab, scroll down and expand **Microsoft Defender Antivirus**.
|
||||
5. Set **Detect potentially unwanted applications** to **Audit**. (You can turn it off, but by using audit mode, you will be able to see detections.)
|
||||
6. Choose **Review + save**, and then choose **Save**.
|
||||
|
||||
#### Use Microsoft Endpoint Manager to set PUA protection for a new configuration profile
|
||||
|
||||
1. Go to the Microsoft Endpoint Manager admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign in.
|
||||
2. Choose **Devices** > **Configuration profiles** > **+ Create profile**.
|
||||
3. For the **Platform**, choose **Windows 10 and later**, and for **Profile**, select **Device restrictions**.
|
||||
4. On the **Basics** tab, specify a name and description for your policy. Then choose **Next**.
|
||||
5. On the **Configuration settings** tab, scroll down and expand **Microsoft Defender Antivirus**.
|
||||
6. Set **Detect potentially unwanted applications** to **Audit**, and then choose **Next**. (You can turn PUA protection off, but by using audit mode, you will be able to see detections.)
|
||||
7. On the **Assignments** tab, specify the users and groups to whom your policy should be applied, and then choose **Next**. (If you need help with assignments, see [Assign user and device profiles in Microsoft Intune](Assign device profiles in Microsoft Intune - Azure | Microsoft Docs).)
|
||||
8. On the **Applicability Rules** tab, specify the OS editions or versions to include or exclude from the policy. For example, you can set the policy to be applied to all devices certain editions of Windows 10. Then choose **Next**.
|
||||
9. On the **Review + create** tab, review your settings, and, and then choose **Create**.
|
||||
|
||||
|
||||
## Review or define exclusions
|
||||
|
Reference in New Issue
Block a user