naming changes

This commit is contained in:
Iaan D'Souza-Wiltshire
2017-08-11 18:04:17 -07:00
parent a2dcf99d30
commit 593fa6e258
11 changed files with 108 additions and 108 deletions

View File

@ -9,7 +9,7 @@ ms.sitesec: library
ms.pagetype: security
localizationpriority: medium
author: iaanw
msft.author: iawilt
ms.author: iawilt
---
@ -36,7 +36,7 @@ msft.author: iawilt
- Windows Defender Security Center app
Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps.
Exploit Protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps.
It is part of Windows Defender Exploit Guard, which is itself a component in the new Windows Defender Advanced Threat Protection offering of security and threat prevention products.
@ -44,7 +44,7 @@ Exploit protection automatically applies a number of exploit mitigation techniqu
## Requirements
The following requirements must be met before exploit protection will work:
The following requirements must be met before Exploit Protection will work:
Windows 10 version | Windows Defender Advanced Threat Protection
Insider Preview build 16232 or later (dated July 1, 2017 or later) | For full reporting you need a license for [Windows Defender ATP](../windows-defender-atp/windows-defender-advanced-threat-protection.md)
@ -160,14 +160,14 @@ You can import the XML file to other machines in your organization. You can do t
6. Double-click the **Configure controlled folder access** setting and set the option to **Enabled**. In the options section you must specify one of the following:
- **Enable** - Malicious and suspicious apps will not be allowed to make changes to files in protected folders. A notification will be provided in the Windows event log
- **Disable (Default)** - The controlled folder access feature will not work. All apps can make changes to files in protected folders.
- **Disable (Default)** - The Controlled Folder Access feature will not work. All apps can make changes to files in protected folders.
- **Audit Mode** - If a malicious or suspicious app attempts to make a change to a file in a protected folder, the change will be allowed but will be recorded in the Windows event log. This allows you to assess the impact of this feature on your organization.
![](images/cfa-gp-enable.png)
>[!IMPORTANT]
>To fully enable the controlled folder access feature, you must set the Group Policy option to **Enabled** and also select **Enable** in the options drop-down menu.
>To fully enable the Controlled Folder Access feature, you must set the Group Policy option to **Enabled** and also select **Enable** in the options drop-down menu.
## App-specific mitigations
@ -245,11 +245,11 @@ You can import the XML file to other machines in your organization. You can do t
![](images/cfa-gp-enable.png)
>[!IMPORTANT]
>To fully enable the controlled folder access feature, you must set the Group Policy option to **Enabled** and also select **Enable** in the options drop-down menu.
>To fully enable the Controlled Folder Access feature, you must set the Group Policy option to **Enabled** and also select **Enable** in the options drop-down menu.
## Review event logs for exploit protection
## Review event logs for Exploit Protection
How do you see these event logs? Are they under specific codes/areas?