From 2461315eed71e7df1971d792d765524df6421877 Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 10:36:32 -0700 Subject: [PATCH] Updated content --- .../windows-defender-smartscreen-available-settings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index 6c7f7d555a..dd5c2ddec8 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -150,7 +150,7 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM -## Recommended Group Policy and mobile device management (MDM) settings for Windows Defender SmartScreen in your organization +## Recommended Group Policy and mobile device management (MDM) settings for your organization By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortunately, this can let employees continue to an unsafe site or to continue to download an unsafe file, even after being warned. Because of this possibility, we strongly recommend that you set up Windows Defender SmartScreen to block high-risk interactions instead of providing just a warning. To better help you protect your organization, we recommend turning on and using these specific Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings.