mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-23 06:13:41 +00:00
Removed screenshots.
This commit is contained in:
@ -108,8 +108,6 @@ Block at first sight is automatically enabled as long as **Cloud-based protectio
|
|||||||
|
|
||||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then click **Virus & threat protection settings**:
|
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then click **Virus & threat protection settings**:
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. Confirm that **Cloud-based Protection** and **Automatic sample submission** are switched to **On**.
|
3. Confirm that **Cloud-based Protection** and **Automatic sample submission** are switched to **On**.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
|
@ -186,8 +186,6 @@ You will also see a detection under **Quarantined threats** in the **Scan histor
|
|||||||
|
|
||||||
3. Under the **Quarantined threats** section, click the **See full history** label to see the detected fake malware:
|
3. Under the **Quarantined threats** section, click the **See full history** label to see the detected fake malware:
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Versions of Windows 10 before version 1703 have a different user interface. See [Windows Defender Antivirus in the Windows Defender Security Center](windows-defender-security-center-antivirus.md) for more information about the differences between versions, and instructions on how to perform common tasks in the different interfaces.
|
>Versions of Windows 10 before version 1703 have a different user interface. See [Windows Defender Antivirus in the Windows Defender Security Center](windows-defender-security-center-antivirus.md) for more information about the differences between versions, and instructions on how to perform common tasks in the different interfaces.
|
||||||
|
|
||||||
|
@ -113,8 +113,6 @@ See the following for more information and allowed parameters:
|
|||||||
|
|
||||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then the **Virus & threat protection settings** label:
|
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then the **Virus & threat protection settings** label:
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. Confirm that **Cloud-based Protection** and **Automatic sample submission** are switched to **On**.
|
3. Confirm that **Cloud-based Protection** and **Automatic sample submission** are switched to **On**.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
|
@ -32,22 +32,14 @@ It can only be enabled in certain situations. See [Windows Defender Antivirus co
|
|||||||
|
|
||||||
By default, Windows Defender Antivirus will enable itself on a Windows 10 device if there is no other antivirus product installed, or if the other product is out-of-date, expired, or not working correctly.
|
By default, Windows Defender Antivirus will enable itself on a Windows 10 device if there is no other antivirus product installed, or if the other product is out-of-date, expired, or not working correctly.
|
||||||
|
|
||||||
If Windows Defender Antivirus is enabled, the usual options will appear to configure it on that device:
|
If Windows Defender Antivirus is enabled, the usual options will appear to configure it on that device.
|
||||||
|
|
||||||

|
If another antivirus product is installed and working correctly, Windows Defender Antivirus will disable itself. The Windows Defender Security Center app will change the **Virus & threat protection** section to show status about the AV product, and provide a link to the product's configuration options.
|
||||||
|
|
||||||
If another antivirus product is installed and working correctly, Windows Defender Antivirus will disable itself. The Windows Defender Security Center app will change the **Virus & threat protection** section to show status about the AV product, and provide a link to the product's configuration options:
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
Underneath any 3rd party AV products, a new link will appear as **Windows Defender Antivirus options**. Clicking this link will expand to show the toggle that enables limited periodic scanning.
|
Underneath any 3rd party AV products, a new link will appear as **Windows Defender Antivirus options**. Clicking this link will expand to show the toggle that enables limited periodic scanning.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
Sliding the swtich to **On** will show the standard Windows Defender AV options underneath the 3rd party AV product. The limited periodic scanning option will appear at the bottom of the page.
|
Sliding the swtich to **On** will show the standard Windows Defender AV options underneath the 3rd party AV product. The limited periodic scanning option will appear at the bottom of the page.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Configure behavioral, heuristic, and real-time protection](configure-protection-features-windows-defender-antivirus.md)
|
- [Configure behavioral, heuristic, and real-time protection](configure-protection-features-windows-defender-antivirus.md)
|
||||||
|
@ -55,8 +55,6 @@ You can use the Windows Defender Security Center app or Group Policy to add and
|
|||||||
|
|
||||||
4. Click **Add a protected folder** and follow the prompts to add apps.
|
4. Click **Add a protected folder** and follow the prompts to add apps.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
### Use Group Policy to protect additional folders
|
### Use Group Policy to protect additional folders
|
||||||
|
|
||||||
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
|
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 08/08/2018
|
ms.date: 10/02/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Customize exploit protection
|
# Customize exploit protection
|
||||||
@ -39,8 +39,6 @@ You can set each of the mitigations to on, off, or to their default value. Some
|
|||||||
|
|
||||||
Default values are always specified in brackets at the **Use default** option for each mitigation. In the following example, the default for Data Execution Prevention is "On".
|
Default values are always specified in brackets at the **Use default** option for each mitigation. In the following example, the default for Data Execution Prevention is "On".
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
The **Use default** configuration for each of the mitigation settings indicates our recommendation for a base level of protection for everyday usage for home users. Enterprise deployments should consider the protection required for their individual needs and may need to modify configuration away from the defaults.
|
The **Use default** configuration for each of the mitigation settings indicates our recommendation for a base level of protection for everyday usage for home users. Enterprise deployments should consider the protection required for their individual needs and may need to modify configuration away from the defaults.
|
||||||
|
|
||||||
For the associated PowerShell cmdlets for each mitigation, see the [PowerShell reference table](#cmdlets-table) at the bottom of this topic.
|
For the associated PowerShell cmdlets for each mitigation, see the [PowerShell reference table](#cmdlets-table) at the bottom of this topic.
|
||||||
@ -118,8 +116,6 @@ Validate stack integrity (StackPivot) | Ensures that the stack has not been redi
|
|||||||
|
|
||||||
Changing some settings may required a restart, which will be indicated in red text underneath the setting.
|
Changing some settings may required a restart, which will be indicated in red text underneath the setting.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. Repeat this for all the system-level mitigations you want to configure.
|
4. Repeat this for all the system-level mitigations you want to configure.
|
||||||
|
|
||||||
You can now [export these settings as an XML file](import-export-exploit-protection-emet-xml.md) or continue on to configure app-specific mitigations.
|
You can now [export these settings as an XML file](import-export-exploit-protection-emet-xml.md) or continue on to configure app-specific mitigations.
|
||||||
@ -139,14 +135,10 @@ Exporting the configuration as an XML file allows you to copy the configuration
|
|||||||
- Use **Add by program name** to have the mitigation applied to any running process with that name. You must specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
|
- Use **Add by program name** to have the mitigation applied to any running process with that name. You must specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
|
||||||
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
|
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. After selecting the app, you'll see a list of all the mitigations that can be applied. To enable the mitigation, click the check box and then change the slider to **On**. Select any additional options. Choosing **Audit** will apply the mitigation in audit mode only. You will be notified if you need to restart the process or app, or if you need to restart Windows.
|
4. After selecting the app, you'll see a list of all the mitigations that can be applied. To enable the mitigation, click the check box and then change the slider to **On**. Select any additional options. Choosing **Audit** will apply the mitigation in audit mode only. You will be notified if you need to restart the process or app, or if you need to restart Windows.
|
||||||
|
|
||||||
5. Repeat this for all the apps and mitigations you want to configure. Click **Apply** when you're done setting up your configuration.
|
5. Repeat this for all the apps and mitigations you want to configure. Click **Apply** when you're done setting up your configuration.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
You can now [export these settings as an XML file](import-export-exploit-protection-emet-xml.md) or return to configure system-level mitigations.
|
You can now [export these settings as an XML file](import-export-exploit-protection-emet-xml.md) or return to configure system-level mitigations.
|
||||||
|
|
||||||
Exporting the configuration as an XML file allows you to copy the configuration from one machine onto other machines.
|
Exporting the configuration as an XML file allows you to copy the configuration from one machine onto other machines.
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: andreabichsel
|
||||||
ms.author: v-anbic
|
ms.author: v-anbic
|
||||||
ms.date: 04/30/2018
|
ms.date: 10/02/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Import, export, and deploy exploit protection configurations
|
# Import, export, and deploy exploit protection configurations
|
||||||
@ -48,12 +48,8 @@ When you have configured exploit protection to your desired state (including bot
|
|||||||
|
|
||||||
2. Click the **App & browser control** tile (or the app icon on the left menu bar) and then click **Exploit protection settings**:
|
2. Click the **App & browser control** tile (or the app icon on the left menu bar) and then click **Exploit protection settings**:
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. At the bottom of the **Exploit protection** section, click **Export settings** and then choose the location and name of the XML file where you want the configuration to be saved.
|
3. At the bottom of the **Exploit protection** section, click **Export settings** and then choose the location and name of the XML file where you want the configuration to be saved.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>When you export the settings, all settings for both app-level and system-level mitigations are saved. This means you don't need to export a file from both the **System settings** and **Program settings** sections - either section will export all settings.
|
>When you export the settings, all settings for both app-level and system-level mitigations are saved. This means you don't need to export a file from both the **System settings** and **Program settings** sections - either section will export all settings.
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user