mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-20 12:53:38 +00:00
naming changes
This commit is contained in:
@ -9,7 +9,7 @@ ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
localizationpriority: medium
|
||||
author: iaanw
|
||||
msft.author: iawilt
|
||||
ms.author: iawilt
|
||||
---
|
||||
|
||||
|
||||
@ -36,7 +36,7 @@ msft.author: iawilt
|
||||
- Windows Defender Security Center app
|
||||
|
||||
|
||||
Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps.
|
||||
Exploit Protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps.
|
||||
|
||||
It is part of Windows Defender Exploit Guard, which is itself a component in the new Windows Defender Advanced Threat Protection offering of security and threat prevention products.
|
||||
|
||||
@ -44,7 +44,7 @@ Exploit protection automatically applies a number of exploit mitigation techniqu
|
||||
|
||||
## Requirements
|
||||
|
||||
The following requirements must be met before exploit protection will work:
|
||||
The following requirements must be met before Exploit Protection will work:
|
||||
|
||||
Windows 10 version | Windows Defender Advanced Threat Protection
|
||||
Insider Preview build 16232 or later (dated July 1, 2017 or later) | For full reporting you need a license for [Windows Defender ATP](../windows-defender-atp/windows-defender-advanced-threat-protection.md)
|
||||
@ -160,14 +160,14 @@ You can import the XML file to other machines in your organization. You can do t
|
||||
|
||||
6. Double-click the **Configure controlled folder access** setting and set the option to **Enabled**. In the options section you must specify one of the following:
|
||||
- **Enable** - Malicious and suspicious apps will not be allowed to make changes to files in protected folders. A notification will be provided in the Windows event log
|
||||
- **Disable (Default)** - The controlled folder access feature will not work. All apps can make changes to files in protected folders.
|
||||
- **Disable (Default)** - The Controlled Folder Access feature will not work. All apps can make changes to files in protected folders.
|
||||
- **Audit Mode** - If a malicious or suspicious app attempts to make a change to a file in a protected folder, the change will be allowed but will be recorded in the Windows event log. This allows you to assess the impact of this feature on your organization.
|
||||
|
||||
|
||||

|
||||
|
||||
>[!IMPORTANT]
|
||||
>To fully enable the controlled folder access feature, you must set the Group Policy option to **Enabled** and also select **Enable** in the options drop-down menu.
|
||||
>To fully enable the Controlled Folder Access feature, you must set the Group Policy option to **Enabled** and also select **Enable** in the options drop-down menu.
|
||||
|
||||
|
||||
## App-specific mitigations
|
||||
@ -245,11 +245,11 @@ You can import the XML file to other machines in your organization. You can do t
|
||||

|
||||
|
||||
>[!IMPORTANT]
|
||||
>To fully enable the controlled folder access feature, you must set the Group Policy option to **Enabled** and also select **Enable** in the options drop-down menu.
|
||||
>To fully enable the Controlled Folder Access feature, you must set the Group Policy option to **Enabled** and also select **Enable** in the options drop-down menu.
|
||||
|
||||
|
||||
|
||||
## Review event logs for exploit protection
|
||||
## Review event logs for Exploit Protection
|
||||
|
||||
How do you see these event logs? Are they under specific codes/areas?
|
||||
|
||||
|
Reference in New Issue
Block a user