mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 05:47:23 +00:00
fix note format
This commit is contained in:
parent
20d937f90b
commit
44a575f80e
@ -40,7 +40,7 @@ It is especially useful in helping to protect your documents and information fro
|
|||||||
|
|
||||||
This topic helps you evaluate Controlled Folder Access. It explains how to demo the feature using a specialized tool, and how to enable audit mode so you can test the feature directly in your organisation.
|
This topic helps you evaluate Controlled Folder Access. It explains how to demo the feature using a specialized tool, and how to enable audit mode so you can test the feature directly in your organisation.
|
||||||
|
|
||||||
>[NOTE]
|
>[!NOTE]
|
||||||
>This topic uses PowerShell cmdlets to make it easy to enable the feature and test it.
|
>This topic uses PowerShell cmdlets to make it easy to enable the feature and test it.
|
||||||
>For instructions on how to use Group Policy, Mobile Device Management (MDM), and System Center Configuration Manager to deploy these settings across your network, see the main [Controlled Folder Access topic](controlled-folders-exploit-guard.md).
|
>For instructions on how to use Group Policy, Mobile Device Management (MDM), and System Center Configuration Manager to deploy these settings across your network, see the main [Controlled Folder Access topic](controlled-folders-exploit-guard.md).
|
||||||
|
|
||||||
|
@ -42,7 +42,7 @@ Many of the features that are part of the [Enhanced Mitigation Experience Toolki
|
|||||||
|
|
||||||
This topcs helps you evaluate Exploit Protection. See the [Exploit Protection topic](exploit-protection-exploit-guard.md) for more information on what Exploit Protection does and how to configure it for real-world deployment.
|
This topcs helps you evaluate Exploit Protection. See the [Exploit Protection topic](exploit-protection-exploit-guard.md) for more information on what Exploit Protection does and how to configure it for real-world deployment.
|
||||||
|
|
||||||
>[NOTE]
|
>[!NOTE]
|
||||||
>This topic uses PowerShell cmdlets to make it easy to enable the feature and test it.
|
>This topic uses PowerShell cmdlets to make it easy to enable the feature and test it.
|
||||||
>For instructions on how to use Group Policy and Mobile Device Management (MDM to deploy these settings across your network, see the main [Exploit Protection topic](exploit-protection-exploit-guard.md) .
|
>For instructions on how to use Group Policy and Mobile Device Management (MDM to deploy these settings across your network, see the main [Exploit Protection topic](exploit-protection-exploit-guard.md) .
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user