From 203b81b89331e19ccf432301e6685038b57d8fff Mon Sep 17 00:00:00 2001 From: Andy Rivas <45184653+andyrivMSFT@users.noreply.github.com> Date: Mon, 2 Nov 2020 08:32:26 -0800 Subject: [PATCH 1/6] Update waas-delivery-optimization-reference.md Adding clarification for customer to add as type = text on their DHCP custom option. DO client expects a string when processing the DHCP option. --- .../deployment/update/waas-delivery-optimization-reference.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/waas-delivery-optimization-reference.md b/windows/deployment/update/waas-delivery-optimization-reference.md index b101477546..29f8b473d8 100644 --- a/windows/deployment/update/waas-delivery-optimization-reference.md +++ b/windows/deployment/update/waas-delivery-optimization-reference.md @@ -249,7 +249,7 @@ This policy allows you to specify how your client(s) can discover Delivery Optim with either option, the client will query DHCP Option ID 235 and use the returned value as the Cache Server Hostname. Option 2 overrides the Cache Server Hostname policy, if set. -Set this policy to designate one or more Delivery Optimization in Network Cache servers through a custom DHCP Option. You can add one or more value either fully qualified domain names (FQDN) or IP addresses. To add multiple values, separate each FQDN or IP address by commas. +Set this policy to designate one or more Delivery Optimization in Network Cache servers through a custom DHCP Option. Specify the custom DHCP option on your server as text type. You can add one or more value either fully qualified domain names (FQDN) or IP addresses. To add multiple values, separate each FQDN or IP address by commas. > [!NOTE] > If you format the DHCP Option ID incorrectly, the client will fall back to the Cache Server Hostname policy value if that value has been set. From 6f108ad3a1610d0a17288a6d1d6ed88ee1e892a8 Mon Sep 17 00:00:00 2001 From: Kurt Sarens <56369685+kurtsarens@users.noreply.github.com> Date: Thu, 5 Nov 2020 13:29:44 +0100 Subject: [PATCH 2/6] Update controlled-folders.md boot sectors are also protected --- .../microsoft-defender-atp/controlled-folders.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md b/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md index 7687279880..bed8a2a98f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md +++ b/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md @@ -42,7 +42,7 @@ Apps can also be manually added to the trusted list via Configuration Manager an Controlled folder access is especially useful in helping to protect your documents and information from [ransomware](https://www.microsoft.com/wdsi/threats/ransomware). In a ransomware attack, your files can get encrypted and held hostage. With controlled folder access in place, a notification appears on the computer where an app attempted to make changes to a file in a protected folder. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. You can also enable the rules individually to customize what techniques the feature monitors. -The protected folders include common system folders, and you can [add additional folders](customize-controlled-folders.md#protect-additional-folders). You can also [allow apps](customize-controlled-folders.md#allow-specific-apps-to-make-changes-to-controlled-folders) to give them access to the protected folders. +The protected folders include common system folders (including boot sectors), and you can [add additional folders](customize-controlled-folders.md#protect-additional-folders). You can also [allow apps](customize-controlled-folders.md#allow-specific-apps-to-make-changes-to-controlled-folders) to give them access to the protected folders. You can use [audit mode](audit-windows-defender.md) to evaluate how controlled folder access would impact your organization if it were enabled. You can also visit the Windows Defender Test ground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works. From ceccb12b89648c766df7776cb316b9b520df313f Mon Sep 17 00:00:00 2001 From: Jaime Ondrusek Date: Thu, 5 Nov 2020 11:04:51 -0700 Subject: [PATCH 3/6] Update waas-delivery-optimization-reference.md Tiny tweaks. --- .../deployment/update/waas-delivery-optimization-reference.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/update/waas-delivery-optimization-reference.md b/windows/deployment/update/waas-delivery-optimization-reference.md index 29f8b473d8..3d5b5c1e2c 100644 --- a/windows/deployment/update/waas-delivery-optimization-reference.md +++ b/windows/deployment/update/waas-delivery-optimization-reference.md @@ -247,9 +247,9 @@ This policy allows you to specify how your client(s) can discover Delivery Optim - 1 = DHCP Option 235. - 2 = DHCP Option 235 Force. -with either option, the client will query DHCP Option ID 235 and use the returned value as the Cache Server Hostname. Option 2 overrides the Cache Server Hostname policy, if set. +With either option, the client will query DHCP Option ID 235 and use the returned value as the Cache Server Hostname. Option 2 overrides the Cache Server Hostname policy, if set. -Set this policy to designate one or more Delivery Optimization in Network Cache servers through a custom DHCP Option. Specify the custom DHCP option on your server as text type. You can add one or more value either fully qualified domain names (FQDN) or IP addresses. To add multiple values, separate each FQDN or IP address by commas. +Set this policy to designate one or more Delivery Optimization in Network Cache servers through a custom DHCP Option. Specify the custom DHCP option on your server as *text* type. You can add one or more values as either fully qualified domain names (FQDN) or IP addresses. To add multiple values, separate each FQDN or IP address with commas. > [!NOTE] > If you format the DHCP Option ID incorrectly, the client will fall back to the Cache Server Hostname policy value if that value has been set. From 533c2a023c9a21a866e49ba792319511d3cf92b7 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 5 Nov 2020 10:21:03 -0800 Subject: [PATCH 4/6] Update controlled-folders.md --- .../microsoft-defender-atp/controlled-folders.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md b/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md index bed8a2a98f..a6b6b5a359 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md +++ b/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md @@ -11,7 +11,7 @@ ms.localizationpriority: medium author: denisebmsft ms.author: deniseb audience: ITPro -ms.date: 08/25/2020 +ms.date: 11/05/2020 ms.reviewer: v-maave manager: dansimp ms.custom: asr From e3f5edbb9153382716bb69fdcf47a042550a903e Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Thu, 5 Nov 2020 12:13:38 -0800 Subject: [PATCH 5/6] new images --- ...> tvm-zero-day-top-security-recommendations.png} | Bin ...e-software.png => tvm-zero-day-top-software.png} | Bin .../tvm-zero-day-vulnerabilities.md | 4 ++-- 3 files changed, 2 insertions(+), 2 deletions(-) rename windows/security/threat-protection/microsoft-defender-atp/images/{tvm-zero-day-dashboard.png => tvm-zero-day-top-security-recommendations.png} (100%) rename windows/security/threat-protection/microsoft-defender-atp/images/{tvm-zero-day-top-vulnerable-software.png => tvm-zero-day-top-software.png} (100%) diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/tvm-zero-day-dashboard.png b/windows/security/threat-protection/microsoft-defender-atp/images/tvm-zero-day-top-security-recommendations.png similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/images/tvm-zero-day-dashboard.png rename to windows/security/threat-protection/microsoft-defender-atp/images/tvm-zero-day-top-security-recommendations.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/tvm-zero-day-top-vulnerable-software.png b/windows/security/threat-protection/microsoft-defender-atp/images/tvm-zero-day-top-software.png similarity index 100% rename from windows/security/threat-protection/microsoft-defender-atp/images/tvm-zero-day-top-vulnerable-software.png rename to windows/security/threat-protection/microsoft-defender-atp/images/tvm-zero-day-top-software.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-zero-day-vulnerabilities.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-zero-day-vulnerabilities.md index d35a04e615..e0d5af00f8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-zero-day-vulnerabilities.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-zero-day-vulnerabilities.md @@ -42,11 +42,11 @@ Once a zero-day vulnerability has been found, information about it will be conve Look for recommendations with a zero-day tag in the “Top security recommendations” card. -![Top recommendations with a zero-day tag.](images/tvm-zero-day-dashboard.png) +![Top recommendations with a zero-day tag.](images/tvm-zero-day-top-security-recommendations.png) Find top software with the zero-day tag in the "Top vulnerable software" card. -![Top vulnerable software with a zero-day tag.](images/tvm-zero-day-top-vulnerable-software.png) +![Top vulnerable software with a zero-day tag.](images/tvm-zero-day-top-software.png) ### Weaknesses page From e5134fa9d7d2ce5a9be8781a825cba772122348b Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Thu, 5 Nov 2020 12:22:41 -0800 Subject: [PATCH 6/6] update metadata --- .../microsoft-defender-atp/tvm-zero-day-vulnerabilities.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-zero-day-vulnerabilities.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-zero-day-vulnerabilities.md index e0d5af00f8..62b6465eab 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-zero-day-vulnerabilities.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-zero-day-vulnerabilities.md @@ -1,6 +1,6 @@ --- title: Mitigate zero-day vulnerabilities - threat and vulnerability management -description: Learn how to find and mitigate zero-day vulnerabilities in your environment. +description: Learn how to find and mitigate zero-day vulnerabilities in your environment through threat and vulnerability management. keywords: mdatp tvm zero day vulnerabilities, tvm, threat & vulnerability management, zero day, 0-day, mitigate 0 day vulnerabilities, vulnerable CVE search.product: eADQiWindows 10XVcnh search.appverid: met150