mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 02:43:43 +00:00
Merge branch 'master' of https://github.com/microsoftdocs/windows-itpro-docs
This commit is contained in:
@ -159,7 +159,7 @@ This table includes the attributes used by the Enterprise Mode schema.
|
||||
</tr>
|
||||
<tr>
|
||||
<td><exclude></td>
|
||||
<td>Specifies the domain or path that is excluded from getting the behavior applied. This attribute is supported on the <domain> and <path> elements.
|
||||
<td>Specifies the domain or path excluded from applying the behavior and is supported on the <domain> and <path> elements.
|
||||
<p><b>Example</b>
|
||||
<pre class="syntax">
|
||||
<emie>
|
||||
@ -230,4 +230,4 @@ If you want to target specific sites in your organization.
|
||||
|You can specify subdomains in the domain tag. |<code><docMode><br><domain docMode="5">contoso.com</domain><br><domain docMode="9">info.contoso.com</domain><br><docMode></code> |<ul><li>contoso.com uses document mode 5.</li><li>info.contoso.com uses document mode 9.</li><li>test.contoso.com also uses document mode 5.</li></ul>|
|
||||
|You can specify exact URLs by listing the full path. |<code><emie><br><domain exclude="false">bing.com</domain><br><domain exclude="false" forceCompatView="true">contoso.com</domain><br><emie></code>|<ul><li>bing.com uses IE8 Enterprise Mode.</li><li>contoso.com uses IE7 Enterprise Mode.</li></ul>|
|
||||
|You can nest paths underneath domains. |<code><emie><br><domain exclude="true">contoso.com<br><path exclude="false">/about</path><br><path exclude="true"><br>/about/business</path><br></domain><br></emie></code> |<ul><li>contoso.com will use the default version of IE.</li><li>contoso.com/about and everything underneath that node will load in Enterprise Mode, except contoso.com/about/business, which will load in the default version of IE.</li></ul> |
|
||||
|You can’t add a path underneath a path. The file will still be parsed, but the sub-path will be ignored. |<code><emie><br><domain exclude="true">contoso.com<br><path>/about<br><path exclude="true">/business</path><br></path><br></domain><br></emie></code> |<ul><li>contoso.com will use the default version of IE.</li><li>contoso.com/about and everything underneath that node will load in Enterprise Mode, including contoso.com/about/business because the last rule is ignored.</li></ul> |
|
||||
|You can’t add a path underneath a path. The file will still be parsed, but the sub-path will be ignored. |<code><emie><br><domain exclude="true">contoso.com<br><path>/about<br><path exclude="true">/business</path><br></path><br></domain><br></emie></code> |<ul><li>contoso.com will use the default version of IE.</li><li>contoso.com/about and everything underneath that node will load in Enterprise Mode, including contoso.com/about/business because the last rule is ignored.</li></ul> |
|
||||
|
@ -111,7 +111,7 @@ Set up School PCs uses the Universal app install policy to install school-releva
|
||||
The time it takes to install a package on a device depends on the:
|
||||
|
||||
* Strength of network connection
|
||||
* Number of policies and apps withim the package
|
||||
* Number of policies and apps within the package
|
||||
* Additional configurations made to the device
|
||||
|
||||
Review the table below to estimate your expected provisioning time. A package that only applies Set Up School PC's default configurations will provision the fastest. A package that removes pre-installed apps, through CleanPC, will take much longer to provision.
|
||||
|
@ -31,7 +31,7 @@ Each layer in the threat protection stack plays a critical role in protecting cu
|
||||
Windows Defender ATP's dynamic machine risk score is integrated into the conditional access evaluation, ensuring that only secure devices have access to resources.
|
||||
|
||||
## Office 365 Advanced Threat Protection (Office 365 ATP)
|
||||
The integration between Office 365 ATP and Windows Defender ATP enables security analysts to go upstream to investigate the entry point of an attack. Through threat intelligence sharing, attacks can be contained and blocked.
|
||||
[Office 365 ATP](https://docs.microsoft.com/office365/securitycompliance/office-365-atp) helps protect your organization from malware in email messages or files through ATP Safe Links, ATP Safe Attachments, advanced Anti-Phishing, and spoof intelligence capabilities. The integration between Office 365 ATP and Windows Defender ATP enables security analysts to go upstream to investigate the entry point of an attack. Through threat intelligence sharing, attacks can be contained and blocked.
|
||||
|
||||
## Azure Advanced Threat Protection (Azure ATP)
|
||||
Suspicious activities are processes running under a user context. The integration between Windows Defender ATP and Azure ATP provides the flexibility of conducting cyber security investigation across activities and identities.
|
||||
|
Reference in New Issue
Block a user