From 2b2220889d33dfa4a4f95ccfbe0db3cbb29afd74 Mon Sep 17 00:00:00 2001 From: Meghana Athavale Date: Thu, 16 Jun 2022 15:17:51 +0530 Subject: [PATCH] fixed warnings --- windows/security/TOC.yml | 2 +- .../brand-name-overview.md | 32 +++++++++---------- 2 files changed, 17 insertions(+), 17 deletions(-) diff --git a/windows/security/TOC.yml b/windows/security/TOC.yml index 1eae1ad2c3..88b707b91a 100644 --- a/windows/security/TOC.yml +++ b/windows/security/TOC.yml @@ -280,7 +280,7 @@ - name: Microsoft Defender SmartScreen overview href: threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md items: - - name: Brand name + - name: Phishing Sensors in Microsoft Defender SmartScreen - href: threat-protection/microsoft-defender-smartscreen/brand-name-overview.md - name: Configure S/MIME for Windows href: identity-protection\configure-s-mime.md diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/brand-name-overview.md b/windows/security/threat-protection/microsoft-defender-smartscreen/brand-name-overview.md index cd89920619..30e952243e 100644 --- a/windows/security/threat-protection/microsoft-defender-smartscreen/brand-name-overview.md +++ b/windows/security/threat-protection/microsoft-defender-smartscreen/brand-name-overview.md @@ -1,12 +1,12 @@ --- -title: [Phishing sensors] overview (Windows) -description: Learn how [Brand name] helps protect Microsoft school or work passwords against phishing and unsafe usage on sites and apps. +title: Phishing sensors in Microsoft Defender SmartScreen (Windows) +description: Learn how Phishing sensors in Microsoft Defender SmartScreen helps protect Microsoft school or work passwords against phishing and unsafe usage on sites and apps. ms.prod: m365-security ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security -author: vmathavale -ms.author: vmathavale +author: v-mathavale +ms.author: v-mathavale audience: IT Admin ms.localizationpriority: medium ms.date: 06/16/2022 @@ -16,7 +16,7 @@ ms.technology: windows-sec adobe-target: true --- -# [Brand Name] +# Phishing Sensors in Microsoft Defender SmartScreen **Applies to:** @@ -28,7 +28,7 @@ adobe-target: true - Analyzing visited webpages and apps connecting to URLs, looking for indications of suspicious behavior, and checking the visited sites against a dynamic list of reported phishing sites. If [brand name] determines that a page the user has just typed their password into is suspicious or matches an entry in the list, it shows a warning to let the user know that the site may be malicious and offers the user the opportunity to change their password. -- Determining whether a user has reused their work or school password on a non-phishing site. If [brand name] determines a user has just reused their password, it shows a warning to let the user know that password reuse is dangerous and offers them the opportunity to change their password so that attackers cannot break into multiple accounts using one password. +- Determining whether a user has reused their work or school password on a non-phishing site. If [brand name] determines a user has just reused their password, it shows a warning to let the user know that password reuse is dangerous and offers them the opportunity to change their password so that attackers can't break into multiple accounts using one password. - Observing whether a user has typed their password into a text editor app like Word, Notepad, Office apps, etc. If [brand name] determines that a user has stored their password in a text editor app, it shows a warning to let the user know it’s unsafe to store their plaintext password and recommends the users to delete their password from the file. @@ -52,41 +52,41 @@ adobe-target: true |Setting |Description | |---------|---------| -|Administrative Templates\Windows Components\... (Service Enabled)|This policy setting determines whether [brand name] is in audit mode or off. Users do not see any notifications for any protection scenarios when [brand name] is in audit mode. When in audit mode [brand name] captures unsafe password entry events and sends telemetry through Microsoft Defender.

If you enable this policy setting or don’t configure this setting, [brand name] is enabled in audit mode and your users are unable to turn it off.

If you disable this policy setting, [brand name] is off. When off, [brand name] does not capture events, send telemetry, or notify users. Additionally, your users are unable to turn it on.| -|Administrative Templates\Windows Components\... (Notify Malicious) |This policy setting determines whether [brand name] warns your users if they type their work or school password into one of the following malicious scenarios: into a reported phishing site, into a login URL with an invalid certificate, or into an application connecting to either a reported phishing site or a login URL with an invalid certificate.

If you enable this policy setting, [brand name] warns your users when they type their work or school password into one of the malicious scenarios described above and encourages them to change their password.

If you disable or don’t configure this policy setting, [brand name] will not warn your users if they type their work or school password into one of the malicious scenarios described above.| -|Administrative Templates\Windows Components\... (Notify Password Reuse) | This policy setting determines whether [brand name] warns your users if they reuse their work or school password.

If you enable this policy setting, [brand name] warns users if they reuse their work or school password and encourages them to change it.

If you disable or don’t configure this policy setting, [brand name] will not warn users if they reuse their work or school password.| -|Administrative Templates\Windows Components\... (Notify Unsafe App) |This policy setting determines whether [brand name] warns your users if they type their work or school passwords in text editor apps like OneNote, Word, Notepad, etc.

If you enable this policy setting, [brand name] warns your users if they store their password in text editor apps.

If you disable or don’t configure this policy setting, [brand name] will not warn users if they store their password in text editor apps. | +|Administrative Templates\Windows Components\... (Service Enabled)|This policy setting determines whether [brand name] is in audit mode or off. Users don't see any notifications for any protection scenarios when [brand name] is in audit mode. When in audit mode, [brand name] captures unsafe password entry events and sends telemetry through Microsoft Defender.

If you enable this policy setting or don’t configure this setting, [brand name] is enabled in audit mode and your users are unable to turn it off.

If you disable this policy setting, [brand name] is off. When off, [brand name] doesn't capture events, send telemetry, or notify users. Additionally, your users are unable to turn it on.| +|Administrative Templates\Windows Components\... (Notify Malicious) |This policy setting determines whether [brand name] warns your users if they type their work or school password into one of the following malicious scenarios: into a reported phishing site, into a login URL with an invalid certificate, or into an application connecting to either a reported phishing site or a sign-in URL with an invalid certificate.

If you enable this policy setting, [brand name] warns your users when they type their work or school password into one of the malicious scenarios described above and encourages them to change their password.

If you disable or don’t configure this policy setting, [brand name] won't warn your users if they type their work or school password into one of the malicious scenarios described above.| +|Administrative Templates\Windows Components\... (Notify Password Reuse) | This policy setting determines whether [brand name] warns your users if they reuse their work or school password.

If you enable this policy setting, [brand name] warns users if they reuse their work or school password and encourages them to change it.

If you disable or don’t configure this policy setting, [brand name] won't warn users if they reuse their work or school password.| +|Administrative Templates\Windows Components\... (Notify Unsafe App) |This policy setting determines whether [brand name] warns your users if they type their work or school passwords in text editor apps like OneNote, Word, Notepad, etc.

If you enable this policy setting, [brand name] warns your users if they store their password in text editor apps.

If you disable or don’t configure this policy setting, [brand name] won't warn users if they store their password in text editor apps. | ### MDM settings If you manage your policies using Microsoft Intune, you’ll want to use these MDM policy settings. All settings support desktop computers running Windows 11, enrolled with Microsoft Intune. |Setting |Details | |---------|---------| -|ServiceEnabled |
  • **URI full path:** ./Vendor/MSFT/Policy/Config/…
  • **Data Type:** Integer
  • **Allowed values:**