mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 22:07:22 +00:00
changes to end user inter
This commit is contained in:
parent
8a9208672a
commit
58f7818c05
@ -38,7 +38,7 @@ You can also configure how standard notifications appear on endpoints, such as n
|
||||
You can configure the display of additional notifications, such as recent threat detection summaries, in the [Windows Defender Security Center app](windows-defender-security-center-antivirus.md) and with Group Policy.
|
||||
|
||||
> [!NOTE]
|
||||
> In Windows 10, version 1607, the feature was called **Enhanced notifications** and could be configured under **Windows Settings** > **Update & security** > **Windows Defender**.
|
||||
> In Windows 10, version 1607 the feature was called **Enhanced notifications** and could be configured under **Windows Settings** > **Update & security** > **Windows Defender**. In Group Policy settings in all versions of Windows 10 it is called **Enhanced notifications**.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Disabling additional notifications will not disable critical notifications, such as threat detection and remediation alerts.
|
||||
@ -75,6 +75,8 @@ You can use Group Policy to:
|
||||
- Hide all notifications on endpoints
|
||||
- Hide reboot notifications on endpoints
|
||||
|
||||
Hiding notifications can be useful in situations where you cannot hide the entire Windows Defender AV interface. See [Prevent users from seeing or interacting with the Windows Defender AV user interface](prevent-end-user-interaction-windows-defender-antivirus.md) for more information.
|
||||
|
||||
> [!NOTE]
|
||||
> Hiding notifications will only occur on endpoints to which the policy has been deployed. Notifications related to actions that must be taken (such as a reboot) will still appear on the [System Center Configuration Manager Endpoint Protection monitoring dashboard and reports](https://docs.microsoft.com/en-us/sccm/protect/deploy-use/monitor-endpoint-protection).
|
||||
|
||||
|
@ -30,7 +30,7 @@ You can use Group Policy to prevent users on endpoints from seeing the Windows D
|
||||
|
||||
## Hide the Windows Defender Antivirus interface
|
||||
|
||||
In Windows 10, versions 1703, hiding the interface will prevent the Virus & threat protection tile from appearing in the Windows Defender Security Center app.
|
||||
In Windows 10, versions 1703, hiding the interface will hide Windows Defender AV notifications and prevent the Virus & threat protection tile from appearing in the Windows Defender Security Center app.
|
||||
|
||||
With the setting set to **Enabled**:
|
||||
|
||||
@ -40,6 +40,9 @@ With the setting set to **Disabled** or not configured:
|
||||
|
||||

|
||||
|
||||
>[!NOTE]
|
||||
>Hiding the interface will also prevent Windows Defender AV notifications from appearing on the endpoint. Windows Defender Advanced Threat Protection notifications will still appear. You can also individually [Configure the notifications that appear on endpoints](configure-notifications-windows-defender-antivirus.md)
|
||||
|
||||
|
||||
In earlier versions of Windows 10, the setting will hide the Windows Defender client interface. If the user attempts to open it, they will receive a warning "Your system administrator has restricted access to this app.":
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user