From b7fb4c0d58895e218a698fd82dbe1a735c01c2c6 Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Thu, 21 Mar 2019 22:56:45 +0000 Subject: [PATCH 01/55] Updated index.md --- windows/security/threat-protection/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index 44c4ef2a2f..60aec9b458 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -101,7 +101,7 @@ Windows Defender ATP's new managed threat hunting service provides proactive hun - [Targeted attack notification](windows-defender-atp/microsoft-threat-experts.md) - [Experts-on-demand](windows-defender-atp/microsoft-threat-experts.md) -- [Configure your Microsoft Threat Protection managed hunting service](windows-defender-atp/configure-microsoft-threat-experts.md) +- [Configure your Microsoft Threat Experts managed hunting service](windows-defender-atp/configure-microsoft-threat-experts.md) From 9d84be8ae944f726424b308dc68048a520de3c99 Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Thu, 21 Mar 2019 23:02:47 +0000 Subject: [PATCH 02/55] Updated overview.md with MTE one-liner for GA --- .../security/threat-protection/windows-defender-atp/overview.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/windows-defender-atp/overview.md b/windows/security/threat-protection/windows-defender-atp/overview.md index f9989d69f7..14ce23d1fd 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview.md +++ b/windows/security/threat-protection/windows-defender-atp/overview.md @@ -41,6 +41,7 @@ Topic | Description [Advanced hunting](overview-hunting-windows-defender-advanced-threat-protection.md) | Use a powerful search and query language to create custom queries and detection rules. [Management and APIs](management-apis.md) | Windows Defender ATP supports a wide variety of tools to help you manage and interact with the platform so that you can integrate the service into your existing workflows. [Microsoft Threat Protection](threat-protection-integration.md) | Microsoft security products work better together. Learn about other security capabilities in the Microsoft threat protection stack. +[Microsoft Threat Experts](microsoft-threat-experts.md) | Managed cybersecurity threat hunting service. Learn how you can get expert-driven insights and data through targeted attack notification and access to experts on demand. [Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) |Learn to navigate your way around Windows Defender Security Center. From 7682c9e76a03408fe6b6b06008e1da7a833372f5 Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Fri, 22 Mar 2019 17:42:22 +0000 Subject: [PATCH 03/55] Updated overview.md --- .../threat-protection/windows-defender-atp/overview.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/overview.md b/windows/security/threat-protection/windows-defender-atp/overview.md index 14ce23d1fd..ce66638a3b 100644 --- a/windows/security/threat-protection/windows-defender-atp/overview.md +++ b/windows/security/threat-protection/windows-defender-atp/overview.md @@ -38,10 +38,10 @@ Topic | Description [Endpoint detection and response](overview-endpoint-detection-response.md) | Understand how Windows Defender ATP continuously monitors your organization for possible attacks against systems, networks, or users in your organization and the features you can use to mitigate and remediate threats. [Automated investigation and remediation](automated-investigations-windows-defender-advanced-threat-protection.md) | In conjunction with being able to quickly respond to advanced attacks, Windows Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. [Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md) | Quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to better protect your organization - all in one place. +[Microsoft Threat Experts](microsoft-threat-experts.md) | Managed cybersecurity threat hunting service. Learn how you can get expert-driven insights and data through targeted attack notification and access to experts on demand. [Advanced hunting](overview-hunting-windows-defender-advanced-threat-protection.md) | Use a powerful search and query language to create custom queries and detection rules. [Management and APIs](management-apis.md) | Windows Defender ATP supports a wide variety of tools to help you manage and interact with the platform so that you can integrate the service into your existing workflows. -[Microsoft Threat Protection](threat-protection-integration.md) | Microsoft security products work better together. Learn about other security capabilities in the Microsoft threat protection stack. -[Microsoft Threat Experts](microsoft-threat-experts.md) | Managed cybersecurity threat hunting service. Learn how you can get expert-driven insights and data through targeted attack notification and access to experts on demand. +[Microsoft Threat Protection](threat-protection-integration.md) | Microsoft security products work better together. Learn about other security capabilities in the Microsoft threat protection stack. [Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) |Learn to navigate your way around Windows Defender Security Center. From 773aa6433f6e8cc2d2f19e1c216efbb4f38a0045 Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Fri, 22 Mar 2019 18:45:20 +0000 Subject: [PATCH 04/55] Updated advanced-features-windows-defender-advanced-threat-protection.md --- ...nced-features-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index 6e0dd42396..2ca7354d93 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -95,7 +95,7 @@ To receive contextual machine integration in Office 365 Threat Intelligence, you This feature is currently on public preview. When you enable this feature, you'll receive targeted attack notifications from Microsoft Threat Experts through your Windows Defender ATP portal's alerts dashboard and via email if you configure it. >[!NOTE] ->This feature will be available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on machines running Windows 10 version 1809 or later. +>This feature will be available with an E5 license on machines running Windows 10 version 1809 or later. From 2c5196da7e7ab726ded5389ff2f64c9179340914 Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Fri, 22 Mar 2019 18:45:57 +0000 Subject: [PATCH 05/55] Updated advanced-features-windows-defender-advanced-threat-protection.md --- ...anced-features-windows-defender-advanced-threat-protection.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index 2ca7354d93..e94b6accea 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -98,7 +98,6 @@ This feature is currently on public preview. When you enable this feature, you'l >This feature will be available with an E5 license on machines running Windows 10 version 1809 or later. - ## Microsoft Cloud App Security Enabling this setting forwards Windows Defender ATP signals to Microsoft Cloud App Security to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Cloud App Security data. From 924164f523aa0e28dfebc9602225dc6296b86c7f Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Fri, 22 Mar 2019 20:39:24 +0000 Subject: [PATCH 06/55] Updated onboard.md with MTE config link --- .../security/threat-protection/windows-defender-atp/onboard.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/onboard.md b/windows/security/threat-protection/windows-defender-atp/onboard.md index 319d254a8e..dc63764ed7 100644 --- a/windows/security/threat-protection/windows-defender-atp/onboard.md +++ b/windows/security/threat-protection/windows-defender-atp/onboard.md @@ -32,7 +32,8 @@ Topic | Description [Configure attack surface reduction capabilities](configure-attack-surface-reduction.md) | By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations. [Configure next generation protection](../windows-defender-antivirus/configure-windows-defender-antivirus-features.md) | Configure next generation protection to catch all types of emerging threats. [Configure Secure score dashboard security controls](secure-score-dashboard-windows-defender-advanced-threat-protection.md) | Configure the security controls in Secure score to increase the security posture of your organization. -Configure Microsoft Threat Protection integration| Configure other solutions that integrate with Windows Defender ATP. +[Configure Microsoft Threat Experts capabilities](configure-microsoft-threat-experts.md) | Configure and manage how you would like to get cybersecurity threat intelligence from Microsoft Threat Experts. +[Configure Microsoft Threat Protection integration| Configure other solutions that integrate with Windows Defender ATP. Management and API support| Pull alerts to your SIEM or use APIs to create custom alerts. Create and build Power BI reports. [Configure Windows Defender Security Center settings](preferences-setup-windows-defender-advanced-threat-protection.md) | Configure portal related settings such as general settings, advanced features, enable the preview experience and others. From e7274e5cb3dbc4647b146c8330694df1529d14a5 Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Fri, 22 Mar 2019 20:40:43 +0000 Subject: [PATCH 07/55] Updated onboard.md --- .../security/threat-protection/windows-defender-atp/onboard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/onboard.md b/windows/security/threat-protection/windows-defender-atp/onboard.md index dc63764ed7..8229b36fa7 100644 --- a/windows/security/threat-protection/windows-defender-atp/onboard.md +++ b/windows/security/threat-protection/windows-defender-atp/onboard.md @@ -33,7 +33,7 @@ Topic | Description [Configure next generation protection](../windows-defender-antivirus/configure-windows-defender-antivirus-features.md) | Configure next generation protection to catch all types of emerging threats. [Configure Secure score dashboard security controls](secure-score-dashboard-windows-defender-advanced-threat-protection.md) | Configure the security controls in Secure score to increase the security posture of your organization. [Configure Microsoft Threat Experts capabilities](configure-microsoft-threat-experts.md) | Configure and manage how you would like to get cybersecurity threat intelligence from Microsoft Threat Experts. -[Configure Microsoft Threat Protection integration| Configure other solutions that integrate with Windows Defender ATP. +Configure Microsoft Threat Protection integration| Configure other solutions that integrate with Windows Defender ATP. Management and API support| Pull alerts to your SIEM or use APIs to create custom alerts. Create and build Power BI reports. [Configure Windows Defender Security Center settings](preferences-setup-windows-defender-advanced-threat-protection.md) | Configure portal related settings such as general settings, advanced features, enable the preview experience and others. From 00635773c508d1fcd1ad92dd91201edc49deb693 Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Fri, 22 Mar 2019 21:49:31 +0000 Subject: [PATCH 08/55] Updated TOC.md repositioned MTE after Secure score to match pillar positioning image --- .../security/threat-protection/windows-defender-atp/TOC.md | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md index 60825d01ab..73dfe31254 100644 --- a/windows/security/threat-protection/windows-defender-atp/TOC.md +++ b/windows/security/threat-protection/windows-defender-atp/TOC.md @@ -72,7 +72,7 @@ ### [Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md) ### [Threat analytics](threat-analytics.md) - +### [Microsoft Threat Experts](microsoft-threat-experts.md) ### [Advanced hunting](overview-hunting-windows-defender-advanced-threat-protection.md) #### [Query data using Advanced hunting](advanced-hunting-windows-defender-advanced-threat-protection.md) @@ -95,9 +95,6 @@ -### [Microsoft Threat Experts](microsoft-threat-experts.md) - - ### [Portal overview](portal-overview-windows-defender-advanced-threat-protection.md) From 0c46d97ac849e742d9480167d53d3160c4a46d70 Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Fri, 22 Mar 2019 21:53:48 +0000 Subject: [PATCH 09/55] Updated TOC.md - positioned MTE after SecureScore to reflect what's in the pillar image --- .../threat-protection/windows-defender-atp/TOC.md | 8 ++------ 1 file changed, 2 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md index 73dfe31254..8ec4ab9ab9 100644 --- a/windows/security/threat-protection/windows-defender-atp/TOC.md +++ b/windows/security/threat-protection/windows-defender-atp/TOC.md @@ -210,6 +210,8 @@ ### [Configure Secure score dashboard security controls](secure-score-dashboard-windows-defender-advanced-threat-protection.md) +### [Configure and manage Microsoft Threat Experts capabilities](configure-microsoft-threat-experts.md) + ### Management and API support #### [Onboard machines](onboard-configure-windows-defender-advanced-threat-protection.md) ##### [Onboard previous versions of Windows](onboard-downlevel-windows-defender-advanced-threat-protection.md) @@ -341,10 +343,6 @@ #### [Configure managed security service provider (MSSP) support](configure-mssp-support-windows-defender-advanced-threat-protection.md) - - -### [Configure and manage Microsoft Threat Experts capabilities](configure-microsoft-threat-experts.md) - ### Configure Microsoft Threat Protection integration #### [Configure conditional access](configure-conditional-access-windows-defender-advanced-threat-protection.md) #### [Configure Microsoft Cloud App Security in Windows](microsoft-cloud-app-security-config.md) @@ -383,8 +381,6 @@ #### [Configure Windows Security app time zone settings](time-settings-windows-defender-advanced-threat-protection.md) - - ## [Troubleshoot Windows Defender ATP](troubleshoot-wdatp.md) ###Troubleshoot sensor state #### [Check sensor state](check-sensor-status-windows-defender-advanced-threat-protection.md) From e2db6b9dbbe0ec4a5e1a13ffdce76cfee8519eac Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Fri, 22 Mar 2019 21:58:28 +0000 Subject: [PATCH 10/55] Updated configure-microsoft-threat-experts.md and removed references to prev in MTE reg --- .../configure-microsoft-threat-experts.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md index 8e6edc791b..5215b20e9a 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md @@ -31,14 +31,14 @@ To experience the full Microsoft Threat Experts preview capability in Windows De You also need to ensure that you have Windows Defender ATP deployed in your environment with machines enrolled, and not just on a laboratory set-up. -## Register to Microsoft Threat Experts preview +## Register to Microsoft Threat Experts managed threat hunting service If you're already a Windows Defender ATP customer, you can apply for preview through the Windows Defender ATP portal. 1. From the navigation pane, go to **Settings > General > Advanced features > Threat Experts**. -2. Click **Apply for preview**. +2. Click **Apply**. -3. In the **Apply for preview** dialog box, read and make sure you understand the preview's terms of agreement. +3. In the **Apply** dialog box, read and make sure you understand the terms of agreement. 4. Enter your name and email address so that Microsoft can get back to you on your application. From ff77d47a019fa6f8676bf4e102dbf913b36e2b57 Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Fri, 22 Mar 2019 22:03:17 +0000 Subject: [PATCH 11/55] Updated configure-microsoft-threat-experts.md with hyperlink to config alert notification --- .../windows-defender-atp/configure-microsoft-threat-experts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md index 5215b20e9a..452fb1f068 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md @@ -56,7 +56,7 @@ You can receive targeted attack notification from Microsoft Threat Experts throu To receive targeted attack notifications through email, you need to create an email notification rule. ### Create an email notification rule -You can create rules to send email notifications for notification recipients. See Configure alert notifications to create, edit, delete, or troubleshoot email notification, for details. +You can create rules to send email notifications for notification recipients. See [Configure alert notifications](configure-email-notifications-windows-defender-advanced-threat-protection.md) to create, edit, delete, or troubleshoot email notification, for details. ## View the targeted attack notification From 01f161ae722f9ca0439f997b5fd51bbcf767b542 Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Fri, 29 Mar 2019 23:43:58 +0000 Subject: [PATCH 12/55] Updated get-started.md --- .../threat-protection/windows-defender-atp/get-started.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-atp/get-started.md b/windows/security/threat-protection/windows-defender-atp/get-started.md index 6086863cb6..c9d9eb3fa7 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-started.md +++ b/windows/security/threat-protection/windows-defender-atp/get-started.md @@ -31,6 +31,9 @@ Learn about the minimum requirements and initial steps you need to take to get s The following capabilities are available across multiple products that make up the Windows Defender ATP platform. +**Threat & Vulnerability Management**
+Effectively identifying, assessing, and remediating endpoint weaknesses is pivotal in running a healthy security program and reducing organizational risk. This infrastructure helps reduce . + **Attack surface reduction**
The attack surface reduction set of capabilities provide the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations. From 204c51c36608d3171be07d5ebfaf600d78c39e42 Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Fri, 29 Mar 2019 23:46:32 +0000 Subject: [PATCH 13/55] Updated get-started.md --- .../threat-protection/windows-defender-atp/get-started.md | 3 --- 1 file changed, 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/get-started.md b/windows/security/threat-protection/windows-defender-atp/get-started.md index c9d9eb3fa7..6086863cb6 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-started.md +++ b/windows/security/threat-protection/windows-defender-atp/get-started.md @@ -31,9 +31,6 @@ Learn about the minimum requirements and initial steps you need to take to get s The following capabilities are available across multiple products that make up the Windows Defender ATP platform. -**Threat & Vulnerability Management**
-Effectively identifying, assessing, and remediating endpoint weaknesses is pivotal in running a healthy security program and reducing organizational risk. This infrastructure helps reduce . - **Attack surface reduction**
The attack surface reduction set of capabilities provide the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations. From 772020c492a30a514e71134acce43cf305fd1881 Mon Sep 17 00:00:00 2001 From: Dolcita Montemayor Date: Tue, 9 Apr 2019 18:03:52 +0000 Subject: [PATCH 14/55] Updated TOC.md --- windows/security/threat-protection/windows-defender-atp/TOC.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md index 3774fe06e5..5a14ef0a68 100644 --- a/windows/security/threat-protection/windows-defender-atp/TOC.md +++ b/windows/security/threat-protection/windows-defender-atp/TOC.md @@ -70,10 +70,11 @@ ### [Secure score](overview-secure-score-windows-defender-advanced-threat-protection.md) -### [Threat analytics](threat-analytics.md) ### [Microsoft Threat Experts](microsoft-threat-experts.md) +### [Threat analytics](threat-analytics.md) + ### [Advanced hunting](overview-hunting-windows-defender-advanced-threat-protection.md) #### [Query data using Advanced hunting](advanced-hunting-windows-defender-advanced-threat-protection.md) ##### [Advanced hunting reference](advanced-hunting-reference-windows-defender-advanced-threat-protection.md) From 323b32a97f9513036a5fd418ce54b43841420fb7 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Tue, 23 Apr 2019 11:20:10 -0700 Subject: [PATCH 15/55] fixing some more conflicts --- .../threat-protection/windows-defender-atp/TOC.md | 9 --------- 1 file changed, 9 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/TOC.md b/windows/security/threat-protection/windows-defender-atp/TOC.md index f55255cb4e..d3ade96a48 100644 --- a/windows/security/threat-protection/windows-defender-atp/TOC.md +++ b/windows/security/threat-protection/windows-defender-atp/TOC.md @@ -351,10 +351,6 @@ #### [Configure managed security service provider (MSSP) support](configure-mssp-support-windows-defender-advanced-threat-protection.md) -<<<<<<< HEAD - -======= ->>>>>>> master ### Configure Microsoft Threat Protection integration #### [Configure conditional access](configure-conditional-access-windows-defender-advanced-threat-protection.md) #### [Configure Microsoft Cloud App Security in Windows](microsoft-cloud-app-security-config.md) @@ -392,11 +388,6 @@ ##### [Offboarding machines](offboard-machines-windows-defender-advanced-threat-protection.md) #### [Configure Windows Security app time zone settings](time-settings-windows-defender-advanced-threat-protection.md) -<<<<<<< HEAD - -======= - ->>>>>>> master ## [Troubleshoot Windows Defender ATP](troubleshoot-wdatp.md) ###Troubleshoot sensor state From e731dab8533726023ffb177d97b29a0a1036d7f5 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 23 Apr 2019 14:30:30 -0700 Subject: [PATCH 16/55] Update whats-new-in-windows-defender-atp.md --- .../windows-defender-atp/whats-new-in-windows-defender-atp.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index b8352cb7d6..450fdcb9a5 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -26,6 +26,8 @@ Here are the new features in the latest release of Windows Defender ATP as well ## April 2019 The following capability is generally available (GA). +- [Microsoft Threat Experts Targeted Attack Notification capability](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts#targeted-attack-notification)
Microsoft Threat Experts' Targeted Attack Notification alerts are tailored to organizations to provide as much information as can be quickly delivered thus bringing attention to critical threats in their network, including the timeline, scope of breach, and the methods of intrusion. + - [Microsoft Defender ATP API](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/use-apis)
Microsoft Defender ATP exposes much of its data and actions through a set of programmatic APIs. Those APIs will enable you to automate workflows and innovate based on Windows Defender ATP capabilities. @@ -40,7 +42,7 @@ The following capabilities are included in the April 2019 preview release. ### In preview The following capability are included in the March 2019 preview release. -- [Machine health and compliance report](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection)
The machine health and compliance report provides high-level information about the devices in your organization. +- [Machine health and compliance report](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-rotection) The machine health and compliance report provides high-level information about the devices in your organization. ## February 2019 From 7f0348159b59ef3997ff067fcd4ed9a3ea76898e Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 23 Apr 2019 15:32:28 -0700 Subject: [PATCH 17/55] Update configure-microsoft-threat-experts.md --- .../configure-microsoft-threat-experts.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md index f2b0ca2157..78ed84bbd5 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md @@ -26,13 +26,13 @@ ms.date: 02/28/2019 [!include[Prerelease information](prerelease.md)] ## Before you begin -To experience the full Microsoft Threat Experts preview capability in Windows Defender ATP, you need to have a valid Premier customer service and support account. However, Premier charges will not be incurred during the preview. +To experience the full Microsoft Threat Experts targeted attack notification capability in Windows Defender ATP, and preview the experts-on-demand capability, you need to have a valid Premier customer service and support account. Premier charges will not be incurred during for the capability in preview, but for the generally available capability, there will be charges. You also need to ensure that you have Windows Defender ATP deployed in your environment with machines enrolled, and not just on a laboratory set-up. ## Register to Microsoft Threat Experts managed threat hunting service -If you're already a Windows Defender ATP customer, you can apply for preview through the Windows Defender ATP portal. +If you're already a Windows Defender ATP customer, you can apply through the Windows Defender ATP portal. 1. From the navigation pane, go to **Settings > General > Advanced features > Threat Experts**. @@ -42,11 +42,8 @@ If you're already a Windows Defender ATP customer, you can apply for preview thr 4. Enter your name and email address so that Microsoft can get back to you on your application. -5. Read the privacy statement, then click **Submit** when you're done. - - >[!NOTE] - >You will receive a welcome email once your application is approved. Then, from the navigation pane, go to **Settings** > **General** > **Advanced features** to turn the **Threat Experts** toggle on. Click **Save preferences**. - +5. Read the privacy statement, then click **Submit** when you're done. You will receive a welcome email once your application is approved. +6. From the navigation pane, go to **Settings** > **General** > **Advanced features** to turn the **Threat Experts** toggle on. Click **Save preferences**. ## Receive targeted attack notification from Microsoft Threat Experts You can receive targeted attack notification from Microsoft Threat Experts through the following: @@ -68,6 +65,9 @@ You'll start receiving targeted attack notification from Microsoft Threat Expert ## Ask a Microsoft threat expert about suspicious cybersecurity activities in your organization +>[!NOTE] +>The Microsoft Threat Experts' experts-on-demand capability is still on preview. + You can partner with Microsoft Threat Experts who can be engaged directly from within the Windows Defender Security Center for timely and accurate response. Experts provide insights needed to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, a potentially compromised machine, or a threat intelligence context that you see on your portal dashboard. 1. Navigate to the portal page with the relevant information that you'd like to investigate, for example, the **Incident** page. Ensure that the page for the relevant alert or machine is in view before raising an inquiry. From 5a9cafc8838751f6a8728045bbd5d2229549716a Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Wed, 24 Apr 2019 15:37:39 -0700 Subject: [PATCH 18/55] Updated with MTE --- .../threat-protection/windows-defender-atp/get-started.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/get-started.md b/windows/security/threat-protection/windows-defender-atp/get-started.md index 96a02d2c87..f3b11e8133 100644 --- a/windows/security/threat-protection/windows-defender-atp/get-started.md +++ b/windows/security/threat-protection/windows-defender-atp/get-started.md @@ -49,6 +49,9 @@ In conjunction with being able to quickly respond to advanced attacks, Windows D **Secure score**
Windows Defender ATP provides a security posture capability to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security state of your network. +**Microsoft Threat Experts**
+Microsoft Threat Experts is the new managed threat hunting service in Windows Defender ATP that provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It provides additional layer of expertise and optics that Microsoft customers can utilize to augment security operation capabilities as part of Microsoft 365. + **Advanced hunting**
Advanced hunting allows you to hunt for possible threats across your organization using a powerful search and query tool. You can also create custom detection rules based on the queries you created and surface alerts in Windows Defender Security Center. @@ -67,4 +70,4 @@ Topic | Description [Data storage and privacy](data-storage-privacy-windows-defender-advanced-threat-protection.md) | Explains the data storage and privacy details related to Windows Defender ATP. [Assign user access to the portal](assign-portal-access-windows-defender-advanced-threat-protection.md) | Set permissions to manage who can access the portal. You can set basic permissions or set granular permissions using role-based access control (RBAC). [Evaluate Windows Defender ATP](evaluate-atp.md) | Evaluate the various capabilities in Windows Defender ATP and test features out. -[Access the Windows Defender Security Center Community Center](community-windows-defender-advanced-threat-protection.md) | The Windows Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product. \ No newline at end of file +[Access the Windows Defender Security Center Community Center](community-windows-defender-advanced-threat-protection.md) | The Windows Defender ATP Community Center is a place where community members can learn, collaborate, and share experiences about the product. From f6ee9c7c24f73661079d4c0755fee5d2dfce165f Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 29 Apr 2019 10:32:43 -0700 Subject: [PATCH 19/55] Update configure-microsoft-threat-experts.md Updated EOD preview note --- .../windows-defender-atp/configure-microsoft-threat-experts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md index 78ed84bbd5..20eb529c93 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md @@ -66,7 +66,7 @@ You'll start receiving targeted attack notification from Microsoft Threat Expert ## Ask a Microsoft threat expert about suspicious cybersecurity activities in your organization >[!NOTE] ->The Microsoft Threat Experts' experts-on-demand capability is still on preview. +>The Microsoft Threat Experts' experts-on-demand capability is still on preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. You can partner with Microsoft Threat Experts who can be engaged directly from within the Windows Defender Security Center for timely and accurate response. Experts provide insights needed to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, a potentially compromised machine, or a threat intelligence context that you see on your portal dashboard. From d5216a70876918148151d09a6a1dbb7ef9bcf4ac Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 29 Apr 2019 11:30:50 -0700 Subject: [PATCH 20/55] Update microsoft-threat-experts.md Updated with EOD note --- .../windows-defender-atp/microsoft-threat-experts.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md index 45bd9d4c80..12df0b5891 100644 --- a/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md @@ -36,6 +36,9 @@ Microsoft Threat Experts provides proactive hunting for the most important threa - Scope of compromise and as much context as can be quickly delivered to enable fast SOC response. ## Collaborate with experts, on demand +>[!NOTE] +>The Microsoft Threat Experts' experts-on-demand capability is still on preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. + Customers can engage our security experts directly from within Windows Defender Security Center for timely and accurate response. Experts provide insights needed to better understand the complex threats affecting your organization, from alert inquiries, potentially compromised machines, root cause of a suspicious network connection, to additional threat intelligence regarding ongoing advanced persistent threat campaigns. With this capability, you can: - Get additional clarification on alerts including root cause or scope of the incident - Gain clarity into suspicious machine behavior and next steps if faced with an advanced attacker @@ -44,4 +47,4 @@ Customers can engage our security experts directly from within Windows Defender ## Related topic -- [Configure Microsoft Threat Experts capabilities](configure-microsoft-threat-experts.md) \ No newline at end of file +- [Configure Microsoft Threat Experts capabilities](configure-microsoft-threat-experts.md) From 1463bc928e2f9a0cee7ed100ca56836e79a4fa4d Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 29 Apr 2019 11:32:50 -0700 Subject: [PATCH 21/55] Update configure-microsoft-threat-experts.md --- .../windows-defender-atp/configure-microsoft-threat-experts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md index 20eb529c93..3e1dad3e1d 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md @@ -66,7 +66,7 @@ You'll start receiving targeted attack notification from Microsoft Threat Expert ## Ask a Microsoft threat expert about suspicious cybersecurity activities in your organization >[!NOTE] ->The Microsoft Threat Experts' experts-on-demand capability is still on preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. +>The Microsoft Threat Experts' experts-on-demand capability is still in preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. You can partner with Microsoft Threat Experts who can be engaged directly from within the Windows Defender Security Center for timely and accurate response. Experts provide insights needed to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, a potentially compromised machine, or a threat intelligence context that you see on your portal dashboard. From 0ce3532073d7b68594eb25a71ed7838f57139028 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 29 Apr 2019 11:34:13 -0700 Subject: [PATCH 22/55] Update microsoft-threat-experts.md --- .../windows-defender-atp/microsoft-threat-experts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md index 12df0b5891..ea59323098 100644 --- a/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md @@ -37,7 +37,7 @@ Microsoft Threat Experts provides proactive hunting for the most important threa ## Collaborate with experts, on demand >[!NOTE] ->The Microsoft Threat Experts' experts-on-demand capability is still on preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. +>The Microsoft Threat Experts' experts-on-demand capability is still i preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. Customers can engage our security experts directly from within Windows Defender Security Center for timely and accurate response. Experts provide insights needed to better understand the complex threats affecting your organization, from alert inquiries, potentially compromised machines, root cause of a suspicious network connection, to additional threat intelligence regarding ongoing advanced persistent threat campaigns. With this capability, you can: - Get additional clarification on alerts including root cause or scope of the incident From 75163ce73740203f92a989ace0f8f31217abbb8b Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 29 Apr 2019 11:36:23 -0700 Subject: [PATCH 23/55] Update microsoft-threat-experts.md --- .../windows-defender-atp/microsoft-threat-experts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md index ea59323098..8d0b702f6c 100644 --- a/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md @@ -37,7 +37,7 @@ Microsoft Threat Experts provides proactive hunting for the most important threa ## Collaborate with experts, on demand >[!NOTE] ->The Microsoft Threat Experts' experts-on-demand capability is still i preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. +>The Microsoft Threat Experts' experts-on-demand capability is still in preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. Customers can engage our security experts directly from within Windows Defender Security Center for timely and accurate response. Experts provide insights needed to better understand the complex threats affecting your organization, from alert inquiries, potentially compromised machines, root cause of a suspicious network connection, to additional threat intelligence regarding ongoing advanced persistent threat campaigns. With this capability, you can: - Get additional clarification on alerts including root cause or scope of the incident From 9510bd3af5dfd2098273f082f0c4de4fb258742f Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 29 Apr 2019 15:28:42 -0700 Subject: [PATCH 24/55] Add files via upload Adding MTE reg screenhots --- .../images/MTE_applicationconfirmation.png | Bin 0 -> 7626 bytes .../windows-defender-atp/images/MTE_apply.png | Bin 0 -> 8892 bytes .../images/MTE_collaboratewithmte.png | Bin 0 -> 10602 bytes 3 files changed, 0 insertions(+), 0 deletions(-) create mode 100644 windows/security/threat-protection/windows-defender-atp/images/MTE_applicationconfirmation.png create mode 100644 windows/security/threat-protection/windows-defender-atp/images/MTE_apply.png create mode 100644 windows/security/threat-protection/windows-defender-atp/images/MTE_collaboratewithmte.png diff --git a/windows/security/threat-protection/windows-defender-atp/images/MTE_applicationconfirmation.png b/windows/security/threat-protection/windows-defender-atp/images/MTE_applicationconfirmation.png new file mode 100644 index 0000000000000000000000000000000000000000..ca8721db8b0714cf6d118f70c8d9318ed5ffad67 GIT binary patch literal 7626 zcmdscc|4Ts-~UvnoFq<*%2KkFiuh*VeMJ$X5Lt%o>loWuh8d@vLP8RfBuBCgGo&$? z8PiF&ki?i6Go!}X24fpyEYIbf*YoG|yk5V5e$Vs!{b9L3_jTR(b$yoi`~A7@)EhSD z2ZbetArQ#HYZhj95Xi1f@c;U+`@nDK-CeTa&;BqA=ST=d^yALYt{f#%DPRL_w;=y7hon^lxi~ujkIt(@}viUx?)8{+W-6@b-o9x0AU4Im{Fe zgZYL=K~}nRDZsXGXP84^RERI6eD13v1R|Yt&CJ9h_Qfp2I6!`CvweYgW-4@lp3ZY1X6YA6a*6dhY;kwt1l8=s$F{Q zFXZeSR6LxzoI?xI;y11mGu8ejz%d$}$S~v7G)<8v0uF$4E zCNUmbYIjX8s{@~#N}Lj6W8bf=)NdJ{%Cu6+%MQ@cYmK@i6ym5mt==R9L>z$4pnWP z{8ep5Ka=Pa6l6I(ThGNu6E9}4J32d4(bYpCmgkN(;br$j2xkqt=PoWeLK)4Nq68xx z%O2{UG_F|@p_czBCB*@A%c-#>DqG?3{;6nUQ^B=OB8fC3oWo{&hfDj9>ODh@uvk0m zqP2{ndX(kMt&~q?a{2a*(=Fpp3<r#*%Z&D; zeLDwxGcA?bUY#L6vWqO`6Bt+#6B|2;gu!6d+S=M>9xOVY+tbrCwMwY3N0yb9t-~XS zJ(u3}PcfOymoIHM(MaTQK|w)3=hUfF(`xl#kgKcf9@<~Zk#IN;%z4x0#L4d$ajowZ zG!401Sy^F``P^CjyLSVwE-usYurC|I!NJ(6)s>Z+odnPM>JQC5a1Eb0l-3$`JQMly z6&4MG&2_%V*7-UcZT{RT)lBY57iU>eX>iL%L-J%}TA-ibRpW^O4M{ak%~CFZV=eMf z0d)KKV^S z%~~-2c}PgefA^Rv;e!uRh58%np=A}2%Y3uNjx!gQ32Z5xTm1dS4Th zFUvYfU@#aIv=}X!{$MOZm&|+6;z^dSBTY>O>gwxDxx7qyG~!p`V5u78>G>DFxq;ZW z^*-U~kt0V?I0O+&ZfRqO(?s>v)zueCtzLbIMaK&{4;8Yn9cnbtxr$2BF*Ll$iEuVk zF}+;))1my2%d-3LUq*@bl8eF?FsmCIq@!t9I{oUt259(%hxg%am}*|N-`*pUw(pb1 zolJrUX$~0bYex*9x}?W73K&9nbAaa>J}n$5ym3z9`0?ZNc``@c9>zesQT=e@^RtSI z=Ge5UnVFC~j7n{j9DU0I1|^XKe{NIejc0@jMjp=p`hy%izY-^w-Nkv`7XV;} zM+|Z(@=I-JM{IAQ01%j(DoCb-vVCG#F(#aP|Nh?dd0lGi>TJF6hi)&=_4o?q0MOuz z z@h}u)GSGPiv8&=pcJ=HmERaB7|L$AXAI`|NwXvC2s!lNCAv>np!==Fsv5#*+Pw@d`;=#GYlhI3plS4~&9!gf5>?DFvJN{;c8j7Fl4^s)AE9~25oajbSM z?VsuZQF+?M$=a5A2xCy+l4b6l@YSv4ewnd5uoJrSTZG&WPBfjtpz;bRnIC4xk2V_I zjJIv}iwC;{j>76|!d-#uo6`;&r=_J~i3jjvMMXtKqZh@)tx;(7oa^{G*fBHIZ(~|p z#%DxgFg$|~-)mmmooA4b3g34VdYHbsi2{`cmi^kU!lL%}fKUlr$FT@i^!)h~m+Eoh z{kLqY9U~2m_b0aiPxi%V>P)I{OpCUWB95=UDd;h{>u@0_izs?;oW*1g7Bw7d4DsiW z$mexUtvK;!c{~qS27y4}M;~e=*-J;?t*NOw-RbicL6ePWOsAIJJ6czG;Qqa>kB>Vz z(43xD3k}Jf+sbbyVx-G>SlJxQ&QG5nii-2LgY9Ivjxc}>SBF;zG{&25T@VL}gI!sQ z_Ek|;wNlHUiN}_T1gn!8nbUkEIoxS?gH5Gi@=f6wXLJ49`fJ@9#TIo zx4v3QoyK3(FY5KMawa&J^=DZq{8$gvDqv%eg{A=d&bRg(p~lLCsq;;rv*!^H+u1J~ znoU7+Kk0l8P|X5E{c5bFq@=y*#nu}cKyAMnW-@bUXJ^Bm*y&O7Eqf-T^z2mfNV{?tK5qb_(9~qm ztu(kpY~2F_Kc|~o1vw#F7@|!R0}D#Z0S;hs^vxtu_Flni{1$+-5MYNI4NmQxU~6)?_sR??_sySYM<=@xWzWL$;AmT zR=z4!oy=Mj$IjYRw8_LVN~r%*!-;p-L$jrh zpQ?7Wl5Wp(Q&FsT#PG&yLFNLO-$o@QDF3Zmj%RfpthCXi2Hkqt`X{EV#7%{0qfuGq zh&hvEc_j$%!g?T*-10RDuW(d&O692u7^JMK%3bW{+755NjSLQKpi`NoHI6NW=jtxK23u_nPUSgV;0)V7?|I`>=bQ?Nk3pl+&VWKB76XB#sHli+?(DqA5G}MZ zcXV`IHma+wl?8c$<;=~@fFyYWaDas}&hBiO*1UA-yX!UxLWRQxq#h6LhM_K_CDO0* z*Pp@E%9Z|AK4Zdnb#@M)m67|C;QuB3jy>}K13QIFFb^Eff`7i)7ZCM2 zvg=<=SOgs;(}}avqG@a$Ya&<+@YbN;x39!g+tJ2{Pgcmg1gV%q0f#A@2#K)ttEswRLsR1IonGsPQK4cdy4KJ>%jV8p^x$b#%gDVp*f? zJ7}~!;GZozX;OkSqV}lqdT5EvBjRqSOX}+K=~qoJ7eBVPvH3JJQ`P(=6o_L$V`T^L zU&h9n7C(MbSU5!iAr*Ymj~J*1GaL?=mhwxq`FX&}>%|QO@<2}As@ay_gTlukK|gw3 za`x~Ld-0ig-LAr6^w#3JfyIHyJroWm)C}RI@u}S@8L|DyW#!d+#gRnN83D#`GCiOt zinU|jI!L?$gv3+Oy?_G5rtQyKC~|F^ZHso@3v)pDy5eZQo}MOVDz+A_UN=Dn^P>PS zqfpOVy}|<$;~#q}LL=iqEQ0XQu_bzI-|QIwW+s0rar+CiMn;V$ts`+5qv_nlhzL87 z^gxXQSr`ecGZ8y;rFm-6>TEW4RlhI;NWN>Oc1UL+1hM`)p!OWO*%k`xgY8dyCjk6h zE57l#uCA`x-*22XZlq&uoLFjmKVQ(iCjDb;Q_$>GUztD^|27r1n`nA#b>>_z{Xvdl zIeMH6_5-9gKlty2ttZhjxPP595MWKvq?d4!A5a*^mKLmmOv_#4NLmUf!21~ zOhy>St!|c-$kVod#1MS)hpHn(jV0Db@1nlmi7xp3}QTaJhIA@{bGt>LbTvLdyidRx_Vy-GKw4lQX^w;h&vU7*)U<>n^=lN6&QxR z@IN#q5Dw$L-E51|B3|BT%U>Z5JFsp~Ylqf1LA6<8>%*aujP5|3n%~lCv`6Nt%ytxg z9nqA0Rl;-_?lzfVqzdX~cs814^sfNu#_*stj)^z8Mk2$BdPJf{|a zH3`~{N~Urw)4)w=cGfIfDS)OFj%C8CFd$5TO19YKbx#K2%Z znu#|AAu!lf;4N1XmwKcJzR+dcq)Uy~g$toZPa9I!NH9;yQX^))dYRY-x-u&yn5U&h zkATB_HDP*%(K)#3T0FjV0;n>q8fjx%CnWLL=U@auOKG}z@#0iqH|rL;r|J86?<}s@cAj*D{fHetkih4g9*E&zFD|?ny{@t(X5UY~AT8$h3Hqz2oR4DNuU%=g*e4x1U}vK5cGp{;|L9UN5w1=8sQWc|Z;F4bA0pFI_e0VQO` zxKsA%6!q>12CVHDYLg6wm;xN7l&%1}dLMs(b6P8@viaew@2D2Q1eawi95E5m(Px1o z9-o-t{QP-41K@IrhWl|iO1iy|TZwj$sR|Mo0fH1He^etAH!LbV4_02`Fl||M;w?jF z;J4=K&mT$mw0TF(n)jz;UIu{H44kxe{`m1Hwd^Aa<{R0)cGHwyxvTy}@c6h?d~Eq1 z*Vzp;+d?S)fQno*`*7x4fT*?2Z$Zl(MTF+(=l9_R2kmty6<$~jPO8J`%aSx8!1BUxKpix^~$`bqhUOlkKO z469^Wn0Y9J>v)1V)2-x@?B*Nf5qhb^g@soe$0T-)()HdJlvHpW`i?%EMRe!w#(R)# zR#lqgwVUa}kg%mMu)Y8PoOS|^ac?jgT zya5C<_^TM?cg+v~y=f#))t&U%)@aR)8P79pjN!c;A;#DmZEr*#Iy5vg@-%*RuG7f_ zr8(}xR7oI+|E@m^Ixo;zr=<9(NvwSrOFSnhxBau-xXroRHFF*k=1)#ovjg`@+gpOg zvCboLtBja-XsLcus1hV*khQg<9mk)}+1Og85QH;&damb#)1sYs#Pi5y#0E1Jo)20; zXRRO-Q&TqhxJ2sG_3PI=`^#)`2vq3d4}0Dh^1+7}dowfiT9-$LLGMISqRLu=yV2H9 zZ_oiQPL&mXT3>GxO$DN$_oZPrklLUj>Rnx)vfq)t%|+WA6N~fTP2(1RwDPe72Tfuj z@3-UE7E7yeI4ixv-1bbFu4EbXxl9@3T#t<($KR64)nx)2W$Vl~STUzX%=oGC#&{7_cW#+V|OX1qQrzq9L< z6womOT-aHG6K$Z*zjth?&c8`NI4EdZk~TUnYXBK>rmRzOW@ck`y++x2sve?+TV=+Z z6)DS!hq-G@6N{hqc_}F!nTZ?Taf@TAFJ8Rp$V4y8$NiiyPDx3a|4V3b^shaP!cw%u z$vMfty#=lTr!3A4sjp3zWcox#+HWT;b}FL!DS|oT&O(46x8%U#|031NqjP-xO~M){ zZ^w@hJA6+YqShTiS7;DB|LP4URNLaW(wiI`$Q6wkRc2wmc7XMV`DI zvN?tsXO3PfU?tEo+FEcRshAB)yGDCf_%x49qA=kr9ZoT<_wD~b#FPcT0?@l7asQV- cxNQqfq0a;lXb4ikCrik+D>i1>%XjYm2g_ajZU6uP literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-atp/images/MTE_apply.png b/windows/security/threat-protection/windows-defender-atp/images/MTE_apply.png new file mode 100644 index 0000000000000000000000000000000000000000..2e6c10154a71404caf9cbd86c296dd92e8359a73 GIT binary patch literal 8892 zcmch7cT`hbx9=_- zgc1~xqev%&mPDi`A@pV_xf{=Y-#5m6W4w3nyJNgR_Q=R@&9(NNYt6OR{LQ&v-Zs_e z{!Q>V006iR4Rr1T09yk1+~?v15&uOUI{0(g-N4!l0FJfoKWr(NjtPO_A(Wws?x9JJ zbNnZdjT-f2|AKVyp)|cwkKH_hBFr}f5ITwiAsr_#M^9IGl&c#O;5#fP0ph>y}Pw31Wx-?(gmC=me~@!uGBDC8q6$KsX^$ zz{a;!Jcx1bi&?m$o;U%83;h=WKol_4(X@D)$sh$hwODUjTsC_cA}P<+COPh7(1%L@ zp~q!%M=a#SwDWPD&a%8ROA|G9Zsu)lc1PeR@;M*ZiMkPltJ?N`M47)%E8E4I4=MbT zhmFd@KQNx(n0{ENcY|OV^h`>~!^*?v04}q%RJj!)aGT|t%p%HCefgOmsY*%+X(Za$4?M)wYC1Rk*xp`mmvW5KF zFD%KUw)VQz60UPVCs*YN(0dTny6yD_TolhFlxyMOB?X`@yb_IaxxPL`OE*y+K$MdM zcjQvPrWW{`Wcs`!*?{vfX!xDd{CqtXpZU2p+0qTspH#Ep(P)C7*m8;S;4zAmD1G$YRP`HSq5nwz>>s8 z?Wx^O3UPjZ*cE_gT<`ILb=UXdO_R4K6J!I|RxL?r|Qt8S@IqTU1ok z2M*^wo8@bixKKYU%zfsnj$6~ZWs6hXS*6@lmn-_rlS|Ae@R>m1Je9~Lv zARbPX-G9U8xK}*A-Z1Grm4T%UY4fN}`Mz;rF^Qvf9`8E@JkFbCm+l(~A1dve`jVtJ zLjiG60s8U|_}8i8-r8yo%TC_;+v_gpRckXny@>NB>FBPE>kUD1BTYy{^_~MaRikn8 z2_OXTM;i+FnB=HKBY8wpTPKzpZUqq2u-l7x2Lgeh-Z?!rwZ#!FX=MPhu;3__yDhWW zw3%&20(cj5FY18KeN04sen9FPa{LA;`51KEpfva*b7e^QB-mZJN8sd1j#4o>IWw1@ zZ0;L@D^p(tuRe;}m>-$EFKhu*V;;sZl>E9t_5rj{Khld9hT)%d0?u|<}wJUKa zT>+k|zd4$%7Lc5j^xk9gvu@p0U=Dicl(>_Vlg)?w&nfcJ5fPka_bRl;Y7wh-_9t$= zT`0c~I?Vekj-NTQTt3H~@u%jcO}XEAR5eoVI&fZXspY_f@*}`Q=->+j&{v8}N)&?k zp5X;*q^Q$r4nv^bi+tkxac7qUV&CWHYFU;LTt+8aBX?^T-EUYxp=F2p&U2IzoU5ck zn*uiG?`Ug>(N$ys_okQWaB*;d+%`2eZ2=O{Z{%HyOH04a1_)*-B3Aq`;O>#b?^IHv zNuaNeV%>6jR(mv9jS)xBoVbe}T%!)ufZ8#JD4Jyc{%s~Ja3v= z2wIu5=sGn$T~t_T0NQE}>RyW&%g@afw=T1kv90}9kQExrzCROEQc@RXWFVkG_Olg3 zaM}JsVk0e92aC)Jy}fTMD=R|;HrPbTy1Krg%QOsv*h{_(oLN22RYh;#-ULlp+EV`v zDx~1Q_E?Rzvs#S7q!M5Rv|&>9laZ@<7cM0wCFaa^d=co-b-3E!e*3N3hcWtEE)E;) z@`$y!E9UT?E#xWRDX~iM=z5JuZ%&G^>N*hy-D43B!Mp3GvjG#~0_>(G7|c+qb(NO= z1)wdXaIX86?)C;_U~hL@!SQp9K^i-7Ts!LYXr)v1%F0S8nF|1xWiR5Y9_pHy#2!1R zjF!-kdkl84!3PDRjoCw@#C1No&-IGQI5gX7M;uKcA!mhX04Ctq0aaIbqu(1m`FV*t z0PvaXI1qAW|2~M}Wdlx2{C|LQFX^03N%viBN>@ar_XJM|WDbb~jVFkqCgM3mWp6k&9ENp+k``3RS%SZlb#;c5pOw7wo5-TkA<1MH^S;Ix%8h)nI z59H#J9othl0dFyOj;TTdg!C3=i$22ED_g78wpK2TMOFqZW)VGbb0qt*Nh1hN=+d69 ze*7+kr@m(qVOFo7Hue=#qBd%cMV7%wF9|6!p~#UH$Va$u#`WY;(x!iNbQb#0S1Xmb^K*gM-z=eNZ5mlsm$ zD)FkN?a}ymlgek9ijk{=)x_y?&frg~$Hp39By2mY!lA_NvVAEyDSqFoJX$ZQ)8By8 zis<+xwYyr?Lu(gsSW*iLtESrbfSdgqqoO0wVe_`VnZ|b8UTi#1O?Q@jfj4+S3$sRomn4X5k$C8^4c|OP9cGgzYcptL zN#6L-SnA!Eo41#Cq~3(Z=zb%QUGMEUH@3V2mujZ3*(o|ActKvSnX^dYfYb;%F z=xipA4q7wHOv)&>8>BctwIOP7dO(9Qzl;Y$|F7*ZSsv%H zJ(a*BMEyZy=YY$zWknU5H3|&+?_6}7mfUd0YCe6@tpU>DQ@$bJmHRPFURijoQsK#x z$vOHwdvqS2|5**A#*1>uKBl%JiAZ=zEk~7;V7M+e`jOdT+9!`WH(TY=vi|Uh9y^BY zy{oo43U;?4whcY1+sQNywIY$drAXzUu1(FjN6$NcP-Oh`7^4=rneOdZ>PkM<1Bzio z@BgqjE8h&At-0E|nI2T4kHhP6(Q^Vw2N)PQ-)@6Sv#4EJ> zy+y6B!{`s|hll5$jPz3!qzU~LH_Gnk$&OF=G;#KRyDrSnKiX~XJhM!EKB5<6(MLX@>|P}OIO8Mz@b3EjTGRcdy_Jpta?2P$xnj5(?_&u$ zb1r%!kYA^Kizgul1%=fW>J>4#2MeRQ(?a*8PMy%tYp(r-A+R=Vr$;4c8Gfv$fp-3w z(?$JFhd$j)Se3hK*q`kwW53BgZTd`VUL_+=cv~k&=#9|K-KO^YLIE^y?t*4_*xW~d z`KyuC_7L9&0!;<~%+O4A`Gq}m+BaF{$`aH=C|<;T=KIlDLqqOyX9Jg|cTL%vlp_&~ z<+nK~4(~*w8QX9hpIUqQr-)Y8$EJ0Le(I7s9V?qY?1 zF@>d}uN#dv8&4Dt1}p}@O_1Qo4^v1EUN+K48j})(`=|_~J_>$n#YZ^ z)i#rYeY`)`VH^AjUNB1yqW5cX2g2zY_yMmH%aW}Tr$qL163@rhNE+l0-5ccvv+4<% zB>j3tL&bs3w4ZywP2XF?<8Q^c|Dk>)_g*Lo=_Vs98;3dv_!Fem*4qYfZWB1nu7?Nd ze(=E)ERr=4BCNg7k)VgbOLGf!UJYvjs`x{$?MuAf|GqLMN7vSFNbjJohagWv#XcR% zELb?L(H@YqG4tnT;D@;s(?b2uaCHZds*NUxzhu8r0oRC>tz?0C|9q=XVp}_HwY{5>kzy3TV7DN2* zYtwQ?^;?HMm+C?k^#&L4{UpRiT>aCTu#dBmgz?YZb43+rmCvl+{Oymun_L6WP!HzA zLvD3w0wIchyH2g{pW(M(A@PolJ`DS^(3d@r_x)1Zm%`Y2&G=YxHZ<1nds*PlbFY=% zaLdh#vpdwU!$;WGNB=wv{D7cxUe?8a{C;xBmnm@hP1!0ThgN4wlM^|&vUN#0(?@GY zapt+#$!=;&$uK7KS%2DTypssl|ZtLG&W-h0L0kBBgf+_4u9Iq+Cy;*Uo~*U zZ`EQ7<0}zj)dMLNXSGhRwk&QP5WBV77hWO29=F*xtY+4d2#rsWkix9|h3Z^=bL z5$ue2`^rl9Z)l!uOz@pm;cpz&o1(>nXZhQpk4ng^}tb=QRX_`8yt_z;vldr zfzj4UylZY=7ozk|x@iEu@Z*Pvaovl!=Lnpo&lF#fulO z1?_BwtTr)eB`_E)aY{A78iy*9q<;Sxwjbz&1Rs=#R?J_W1K(&|E7z0A~@tzkmI<5A#PBCi0aeZiWw##JGyxJvIPuQ zOb*Ho zz*~kX;XR`f)M%QmTI5R!v;yfgX7;)pximTXPLBwdF;Jg6Lb z;(6mNX7+QeP{GQICy``jZEY<~)cJG;Hu$>&$SBLOWKXr(Agln;mc-FOBHP&6ouw+X z`%8#vM%&m*KskZ7WHNKUabe%nNRj`D8eBdfv@sR?;)OvP0A?j<+Anfc*+S<2UvowO zHKU}v`&3*=@yXwNBK5L$|0F$%$(!Ksq7U3urIu;5P{D2X5BW>#XiGeNpV3#^5^?@gGbp)5g%KlIPIPTV>WLgvGZiAzhh z7nfhA(IWl0`mbJdS+Mf=mjQUa=l0(pO_xvThW3e&_nJ5#9qYRisoiCT`Tf%NYPu)A z3xoMkI^P5TiXO|V$|>wGY3Q^wZpaTG2tQTGUG93_$(hrx+tCIZySEy)iyQT{PRp+4GP+*2f!Y3!0t84;?6}v|C9IVH2S&cm{ z%CuXA#zW5ZE|Uz4+U-P1@61yNvp_wMi@$@>M{#gwZY`aod+bR=Nvzz_)9CjF-9Mq1 zhpz>P<~*;@;?64U&*vdq=vi(nB;6kXS_FJu!iy^miOF-!XjZ&a@ZHutV-iu%GD00* z_jceyCXdEmv_!Qlxu5f5oa^OD5 zoUq0FOnBe-KKjsXv7Wj&_< z?A|dhEt&L{1pwz08aqp^21Edex`T3I1Czqg=4VR%3Md#jW`Zmm@Lj)uyxvO!s(pKB zOB~RV`}-y`Ha3>{JIf57ZJ;=qT{sB_P5*Td|Kmh4;P|p5UL^ikvbp^Ym|4De7ky;T z9dapX*=pAc64sME6=Ybcp=w$Cj*VZ9P^fROl3S2Q=6{;~*uu;D!il65Z*!h5k;4_Y zB|?x%Hy*Y{84$lem>}g0xLM8w>|h^z=36$cB+%Gpu8rq9>^R08{HsV$Z6#4VO`ZPk zr-T?kjH9>gVXg{%Zwe)Kp|-g4YJUm zms3;zY4gk$=rW@*4q0m+Ys2ghqCQt`V!rL7E1P~8)!TkUX|SB#DH#$O`ugc?o&j!W z1d<|LNIb$yE=aDW;>pV|Hv(0AC+pX3HSQu89&3z=*ksVLLFn;=-FsDt`iep%G$ z3v3th-`SisOIO|#M0yeLv51~Cl&d!dXc?#_M-N>J`#cz+NUiQm33TOD3hr3PQ&R`01FdNAzVBFNU(RH(vtI8R8j zev#Wqg!lfBrAORCgH|HSFejmOjEp`_!Tn}&WrWdPk=aPfJ7v=5XkXk0vxX6YS18F- z__!KI(RS!Mn}hMa6bIK@;6f3kOEg+%g(QvEjQ$ZGE@c>+3fJSvO2g0&XEhww4zGou0OBd+&&jPP$yUIi%@DP zkhN>hSBRfgX|Nl`Woap}QrSkW@8t2pj*X`f@*hvgT(lXkAaB3w@waze;tfJ5Ss#Fs zZmF9pL^PVHkl~ zuPV&q-R6mY#Bbm<7?}*JEDmxqzOGEo^KW;39b>0B4Ot`XXIv!dQzH>^$OdFDAA&u~ zZTXBit;9A$lAh)U`H8yj_sk$0HrU?@T6fbgeLf}V>=+W zaw8FB(QSzw;wy(8$mYTN)GPb5XR+bh61~l!`x|=J3^X^#xsf*sWfGTdR)f`1WfD&j z&8t`<4!xyK*)V%EUn7JY&UcFie%St-c2?vu8ZJ^C6fZ7;hn?M_AJr-)F8hnG((&ko zD44f>VQ|A#0Y>H7fSWlb&8#Ax08tdUxLPiwGZX+W{9>Rd=rs1d7O)bkDV3k+;ddIi zAF*)xf1298{6j)WQBhG3_o5E0qliP zOG_JGr#!3j^zu@H))p5V9XfWlH|n^=HJ|xmWXUX8cIsc6XiZ5<8jwM--$b`NMO{-= zge{Vr644J@Bfh|DXrIE5;5?^|+F&pw(lRixiIYe8a*>1u=h4%>2+e~)lZ>o38ssT5 zGBPCp^L-HQ$YTWX>Vn40**6w~I&h!VQoofk+H^){CvKehliM9I#Pp=6i2@2jn68@xl;eiI$X>mp2D11y{yy15qF9jvhDs+SLUCc~pOYKMEX|L2j~j>CQY{ z68r7jtyp0-n~{-`ubrJql35zTWXJ3cD#PWPtE=nRFJJoR`rfBxW|q#(IOq5bfW0SU zuNx&MCM7{T*>9G<9OF&M6dBrQBh5S0a>j|2s?ht1iOT-l;EQ&;2gs120yB{uCy+x5 z3^4)Gp*HWRY9VD*;bs148l5g>7{h^SV`F3UEY&MmcD(8|P$%3r9ll;%d@)PO zOOHQVS6W&c=ROe%%BQ?}BW*|cT-lnGV z3{^w@|J3Bjn2beEGkNZ1oQMdoSLF%8cU-SN*&$x0W uAqlKYy=g-Q5%41oz);sz2cvaA^gjSVa^H#o literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/windows-defender-atp/images/MTE_collaboratewithmte.png b/windows/security/threat-protection/windows-defender-atp/images/MTE_collaboratewithmte.png new file mode 100644 index 0000000000000000000000000000000000000000..6c39d3592c9c7389103c81d053f2c07b1046d03e GIT binary patch literal 10602 zcmdUVcT`h<^Cn*#R!~t?ss$S=NSDwoD4-PSy+{uw)DU_suLTuQ5GhiW-jN!5EH5Bk zI))Mz10;~3lmH2Vo$H?Wul;BD_uI4QtViMcxi|ODXXcq_o|)W;+qxQib_(p|;^Nw) zrKxVf#kE-AIQ!6|BFjmoHadafc=>?e>QybtgXuU$nPB+6%+Qx8v9eSl@}PU-R+~@%hS^d`-D$f5-;;t1d-tL=r>V+ghej*Qmj@M5F1zmRSmShDe9-lI+`Xid zNtz)Jk!Dt6S{)%iTwHexS8`DQAV=PE$DV9L4tTexBfmauzJCV!{rm1wB%)l(NB>`( z-ej1 zyVlm)+M3YlDx3fDJ%j78RP&s;u0nPoE0SwM_WXzm;pWM2ij$ z5!bO}-kUR1C@)pMMH0AWn~$@nlH64O<>NEONMOm)&~zB%r7YDyT5hUtJv6B z>C4K&i@8Z}-WVGhWx`HQ?%zR~nmQ*EJu_(OH9#9E7#JNb#Lf&-Ut3~oep2=cU0Bgq-P+n(KtP~(dO8qa*{Jy^TYrPLA{4o55|fmoz|{M}}5p4^-q z4L#M>%*`}Z<0VtG7R4xyt^DCqUI)!>Crg-XmAs^D6x zrr2V;?YcqCf!*6qYN@8_1qB5`_@a6qzkInb^7(Vk7}ya+IZjjTKy(XbVO3UII(=;| zbY|(3M!crf@DXR+DFw{L$x{G+wKy_~7!(7YQEXx4&`lH0o-fJpuHaF;`GtoA86 zcwBO_5Lj|1QQNKg`4I?Sls`XQ%a-c<(@}9H_H?P4_Djuw-<N zO%;iYi_0St$uz5tX$>_42%Sji?<-p$TnSt3(Li~Bzl%~*qAatqW7r|;En8NM>dN=c z!YaW=PEJm!@U?12BO7CEYFbcKq$An5lJ4v02mY>bY~8QI9CmsEzXr`6^R0Cn4bf*p=7B9^Vojb5Ivh_irG9$40i^S>E8lvGV?`#5pY(2L(6l})!=_s5P zh@{PJtj|??|G0_`2)G$jg&E6-aC0Wq)-%9au%SwiZ_)z;1AmbPK3VF$B}twAR{peQ zLj2shzUD~5gAwYBB^#^~l+Vw9=_X%#S6nPH1_rR!rqt#%qk}L7B_-WEXJNx~%F2aP zsUf-xQ{99cJMoJdqSRllv8*vN$GTzV=d-rp2#m@l?%xe6~%+> zn8V=+2nqFX=2dr&|gq@Qi_n-dk3|e16L`aaZ?3GUaP7<1p)nYP_cn9; z&owO5cG<4n9}j1HR#sM`VN)iGDJmf*(aQ5rF!g_KK;=RpqPDTxy%gycdhO)Nlc>Po zZ=*!jivRMZbH`VBXsq6{bp2tgHukp6dEuRzO zu}oWHa|Z4AKm~wOF+{3#m&31zY8jx>c{gs{@Sh!)vc_|kYUx!YK(I@HT1022domE* zmyBTQbb7PU_X|u*1`A3W^FtUl8URg!BS-X=MNIG9dDpl`kvs<}iEzRGh<`C^rbI4S zRo{;B-{35}Pj#grF-F{)DB~i&cRPYwgb|!Old?uft)NVz2Mf(p7sN!O-Ql2?!yGxd zdmH@yi-S%DveEIEw{>-+=I7@tAbk-l5xQ=dBo;!dAlW(iWIX-)Gk<_ViV{v2Hy)I8 zLqj7@`;@VTMgG=Z{L>lHsxjm_Qy(9n=EY`vsm@dtOJ0@57m)HNTX$vy(ojVfl{ZU> z>$SeVzWy!3xar!N;&KyFD~PvAiA_;V%>K?4B~!$!NNC}y4?o{Q$P$twu6wF)p3=UQ zwy~PV`u&;L*xWo1B*E=7nU-D+14$NWe!})`55&dAdqD^k>X(5%t^@hTJGW$88*_uY zGIq0AI^S8Yg&V`hBh_%CC3@y()3YQcTrrZ92t%GFx}+XN(l}YsuW*PHPFzavhC^8# z!%C|xwdpLB5D%B0^y^UA5xC8*bXKOs_5`>e@v--h z`%4|V(uoz>!p##tCu6lv?vL0pbqgtwo8BF%6ciGwxPK`>|R@ z>Q-Rr!70^cMNn1NP$EN?83Vu;h@|nG>dGrCGuXU&GZf_`eQ&f+0o}@lFg;pi^iQdo z6j@|>Un&IdGcGVO??&WV=NkpRhYuePPSFc!P^rRJemq7JwQ@8>Y`=a`Pz?~av6)$} z-NorZo-XZsvb($znv|20k^r5?*49OmVboiEZ6SdE51tlV^?S3rf{yO}TISTgI36-b zUHLOnyF4C(0D$kbZYC!+(PofL_KH*o!_V23$viudtcD-|!vf{@78s*5P0beM1gY95 z0|<9<@{O0<+;{_PQh}HUtYuy8edWP}2PPl*pEdQ9$t5!-M4Nk;?X-X2*%Z@m9X_IZ zvU3ZH`fGC14fvJSX4+_fL6Nb{M(XF!fA3IP9`&;*bBt(QD)MRt;Yw}{qtWTuEw}k} zyw39*YG^!0K=5(x1hA|4nKSQSV~N!4H%J;4R9BnzW*t>jP%wp> zsI%IUpjEzlK_aa?r_z0h7Nx|vt)~~gzM8gS4nED#%S-%tc4Tre|!rf6)JoYkUFB^)i_i= zENc;sI8tr>PxQg)mP&vmqR#E5G*F%8M$TAO8H+dx(OGm{xJtegugGYcpXANb&{f|( zJUrq;JnsJf{T5ATNk54J2 zEy60uStzW72QHVR-YM$VT|W92T8xxSK3AcH2hS7{7FjbTmIVUaHvI!nb2R3KM(VD1 zcBiHhBoxq`Q>4i#vDYR0FgNvl=V0;hSBDzqetYh~+e-5ZE6 z38TKxkfI2hfh@(rfS6>>#}fy_zab*A?&UxpHEQELAX5p9q=*N^WDTdpG;1Dt>- zkz5n>s@De~km`fVnT)Z5x$xz>om(~`ECgJbfBhN1R;{c`XKGh(uR)Pbg9Q@1+S*zp zOUpODSXDNT-m#y?oC*e!D(5$;-Qss;b#>Kbud#_qHk(nWS5#Dl3SD^*ssLzqsj?(Y zr~UN>LoBw^CTz*LVZQAgYt}`r0K`RSvZCRiKr0X-wG&ZFi;^4jlB|`9Xv5+zQ^;%} zgF`lfS1w$*0NqQHf>$c0jxNt>!LL2O`tAj$hQbfc3l@t-cc-ebXr{#c`}a4EfwK{X z04nX3rkIhjaTd@CBo&nqK0`oK6WWsLhlgxlh#`EFgw_$;kCamAQR5y#^Xe+=#xd#t`t=3) z*P#x84Ae7Nezn!H*JANFbi}T%ni1-s1SnF(0brP-#hU^PbtaR69m_fgrO65u*G3r> zDjymGq=8yyj3I?2oK3)6Zr!>SFbojz{Z;ghaKuM?)vIlEwk15-`Cu~uYb#)P&mMD% z+eX-VaK(3Doi|5!4mFyc&z{3?um``y3}uZYu%_CPl=&X&Jx)(Q4tj!X){8Ut^()X()N``Cr{@5ZK5{yFoSI)*X}q+w zM4O$}UTst&N>it&znF=@Monyz=!B}O;9D!F-@bcyY^K(!CI1=D^lkF&KnH|2X40p0CsE;>UH!L-eKY_O8a7s!Fsm3qI&CRXCb3}e-i8{EV z{Rp-M4NhKF74s=QqpE7KlruT$40-K2R*U^KvU}SDH!rUt0CP+I6eH8f$jEi5*qU#A zD6SW#20wq=(}zp1^=93;v$4(@Bx5EIYjcv@9NauTjV}oWB#Y*Gd@H*SZBN?md;@4; zhWhl>ik?2*sYiDA@G!b~Slhhi`>*0>e4Tz)4P~C)GL=WFeMg60KYFyybNKxaKF^FX z&udjfrP^pc+*tA%9C0h3!jY-^x^8`IYZXe^GpaM`xw;B_wj8D%f_*`?$+~K%kZRgi zSNp@;tf{HV@WpX2s0{Z%em6Req?u_cT57-3qir%{_ok<(ZyOrMF5%7`XhVG|)9X7c zDJjaA1(87}2)$YR4lN7wvzN!_hK7a;ii>rDEC#Ct1qDIb7Ii1oU3ON2g64)sm)a2K z$m>B$G6MGal6UW}yu1Bnr)p=)T7JH``!7c}lMcc=AhWWp%vU=#8-=OU6ibJeE4Qeq zQ{Mz)Oq-eMOOkUJYME_xr%0&9MuCpBSaoUZ7b^H6A;Xr+5|1`=qI5k*XceS;>JlNI z^~;%@Qx^(iD&zHQ{&N=?4h01T<@0^kyd5D-mXWP(Nm7!4UWOciLR?ak5LHrBV-D_6 z3YdL=9Z>dX(}QfCJmXn7AotF$j>>6g#d3 z!6&H3=1FAQlhfD>-;&*9%G%QwKrZ#ka)Tvy}xJ}eHGbDnQm(OoTk`A;@VH6(FxU?8i5&^l~dyKo9}2KPf} zj8uV+1%)niO2>vYWz^z9v&m27%Ju|b2^+R_mcE%wH0NS^CQSrH>*lx#8q(FQl@i_h z8(@1XDk_8F&F*-*fw1W%p{l5n)XB0k=?gaXX1&9;FWmYEQcRtdATr_w)^!1qirlkK z@ffAagfTKW#jI^j0y=O&c+ouQ<(-c|1DXtRIKo8Ic`Y3s9mo~~=tM~*lF({=eyTts zEhwKUW<2s8qcqDdn77-efh{_MW0S914DD2 z?{`$m!^6{owzWoAMk7;K>%c<*#J(!ek;1pl;W7UH{?B*hriL-UNgc|DY>bPKpBXN7 zKtzIzOAh2qaB#2?HIPNk5hmZl?o;rK;uTSzc6~2Raq;vl0!Q@s^xUCL!Km`U&WFus z@7XG>PaalMQo=$fH^X5t7*d8)vrbiE>;O4=dAFItqCqQ6$hyEpT-**!mTk1Rb5d9Q z9`^Oz($XGr_Y5Qx6tus(&M8Bc&reVP^pZEbYiMxLBGOvEZ?)sPE(@Dc=g`9AF5w5# zi!?GKjE1y3!dG$N(4m5=DihEIQQd%NB^nVeMjt6xr~sOaD$`R)3vP)Lc93XGq+J!C zJnq!%klHD8sMn*b(qsPQ*i>g#XE|(hcaHt%l=av?FEjF`k>O+KimEdpxm6I$IUC^ zU%`3IBW!TyKri&Vl>u~%neyyN`6am#RNwIMC16+i4(;6`Q=hj3*7EXvD*C82VvTuB zzGp@IWYX)dKzd2aS#F#LY1Bi8&6u4v0x&}CvO)0zFSlS@m6x67>)yTl*s~AeR1nZb zVHFh>muUAJ=w;pMhrN^{BO{|w6iQ+(j8cGoBlDJ>pVqM_?ek~QfM}9uPQldV>Yh#@B;k%{);bRNd9aixE8D4ljv*bV$Q?{Noi%_VX-~EP z`u_0&vQ@{mM|%XD)ra!>2M1B&#?WlBSgb&RW*{nXW)B&Fu)fw*Nv+Lni6B1}@$1!S*L<-kOyRU|nP-x?XN92Wn{`uF{ zV=%$^deh;OP}lI@M84L{A_P`BfW-3kjrn#-sCSBOvp*h-R<+euR}a5Tb0&X#J>XbQ zzGGYCOGzlRDR+)s!s7(aiHifm3-9*Ycy;^<(P6*7V2SJ%Mq%weE8tfu?21J2A}8qI z1Il&BBXjq>yi%GmsM(2yHws==iNYYz|dV1bLz+0AOBIkAeZ5eY>xbcLS*H1tb1C!XOZdnC| zbBA|ZtkSc(wmi6^QCmiTo8{h@dCSRhBjod=J!fa$Qe{aC#|PFW2`NI7MFH6|m=asq zg$ZQ6gYBsomE{CWBq-1&16BrBtLDnHvv0suCyE#ea$bulQ9vSDoZBnnr3Cc`hN#s` zsjD{fv)I#uz`Z`Yk3Qcq2I0KsQ5%fmRgd(TvB~#4KDOR6fq?>6U~FT98LO5-$JJ9@ zvS$kPjg2Xnc-Wm|?Nl{^#5OG84irUb4k#3EPw%HMoSW50D-RvQw~OyB~^B@9nxMrLYTh zdb7WnjIfv3{v(EZz1H231r<*1`~{d{4RWt%OFucHs>WtyH`}OYaL@#Rn=^*14VKWE z4UJ8n`gf^AOY<21)DQ1V6h$j2n^i*6t^Q$h+I#QZa2qZ6mB`shpt17;J-tr6)NEep zbSGo$1(_gaMftRCFli3QhZ3~!jSo0lY|)<-)0Nweo+=iCZ+Kese_ZU|leo(;8-0>N z&qnn$7pyUk=`LH18kKn(bqJHd5)j+wCyoFbX;kVFnd1Rj3D4|8Lf8q^2h>1CpV1&j z<9pBXdUFKN5LgGE%AvBPoz&EZn{pI8>G)B3oGqKh5;ELm;3N6rC8o`^3ioQZK(01N z%rPcUA~23&)jr7>ag@~l$+P8j2%GWjj;*cj;E0}F+`RAWG!aR>q>HUhw_smDq6_bA zhrgJDWQr==kDrNlO-$&9IvAy7jjgvs*Yms@qg2IGNo0?{a$m|#I+;ioP!XJ~^-?42 zoF=!oIWS+&u~@+chN&1OXFL_tt1TZgr6$Ca({MI1FEwPx_R$WHCy?dc3ikBox+|~q zg-(TJDX?>slny7mZuC5BM|;u9QuR#h7KiLHQoD;ZODNW-!?YYNlTrdQ7UdW(_|N{y&=9CZ$3KW z*Q7c{elI%X$T;_Ap&0|jH)t=+tjBnG2+44?=S^H@TPzI>?1eu=*+jJbjH$bO!Nkfe z*)RG=?F^BVxT6k845_nK1}Y`5@=|0KXtU(X=ucVh_%Q?P@=jb!Na|qNZsx+6_SOz& zViHtkjd2*sE-{%=bty(u&Tv1ZF@$L>gvtGlGb!JcA^6leDIABxk?g|igE84!-;};F z%0%ZL#iL#5-T6*$0@(7S6wl0ak6WGF284Gz)6{ft)aYh5?0I-KD%jcf$(6QIT<2@8 zXYA~c6sDrYvVa37*QPVON%NI|-u#<5(r7_o;_}HXtB+^+_}(V=9K~f=+t@G??44}s z#Zdc_p1#6VN)n1J2^MPpBspJrv0(dI{D4&yr?6;`UZ=&OJy^(f_y9(<%dW+6G;dz?e%@euZC2`nBk3{N8 zrbDcR4qM7_Z|{I$d9FtG!0PCTJX_}T3KT|^@2@8l5Ic-?JLDb+b4#W4sB(xGIZ;LE{p|DV3f3Ln@6J9 zqZMkr4qZ?sPXSN5SRH8ZEF5&RL`I&h%Vl zGEr?KjlK@Gz6l;uOQ8 z+8dg!c7?V&N-GXTa9zZzMu_4Y1zt)H73Zyd?2AZvE~=GQTugCzvpxKLh_4l0Z8*HL zLZ{jhB-&(m&f@EKKG1j?BeN%3`gNaJY^Rq*SAGKRDJ!^xt-yjnetFuhw z+%ju9-q`L!c@tC9<-ED`N!)B1&Q}#_88u&(M8o0|+2!c(2E4_p$c^C-Z$cM*&5I$MhhMLPS0uRXSS$To^k-go^|M_xgDUM_P%j%^{H(WtY)vSM4A{fv8ukg6}FJ}uNJ&t)V7QrVeB}W+B*Ae#+h^e^&8`& z7Y2HRf>`CI_^b_c*0 z5`UiDGeae64R!tA5pK zbEe(c(Cj+N{NJtn9`f_&)?YG>sgOF*KbkJYSvkZpo#a9`8ERj=dbDlJMR%t_F_}4o9kF7ZANe&Xg~LMxTSb|?7UWH^@3FW}Zhd?;tyi;$(0IwVb?&_Byi&XI z;zrJ|#Fxi2>LlGb8y!u<37*zMI%XSQ8*?8k*lTJ(o~S-muXNUbDRy=-F|=VkWqko| z##Jmbv?infuKU*vr#yo-F4!>WPO!Co+j;KUQh!pALn>NYRpGP(W#&fq!FA?Fx~<;0 ze!5HJ{E>qc*3uzQmxj|KaFY)eemY=MFfQ+@FDH1F^AE?fMX@D>w=kh-k3zTa7JaXc zkNfHCL1~Qqgm+&*Z4#y(@eQ52bx>xp!&Eh6;hIm_(ypeMSMrxw&#KBvvgJ*l0WG>B^csVxy6-LDtkS~dx1K2-ke zC~fC(9W@xD%v#>4&1Hvwl^JM7fN(M5FOg9qR{qzFjdNee{mofB>3#o4!`zP*D=B|p uDyz1*xc|R14gL?Q{MTm5{~vvNgIBGUYj*$oPG^V-m)3P%_2R2`_x}eeZ`0iX literal 0 HcmV?d00001 From 769579a867ed99ffe9ebba6ff880efc3130f4721 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 29 Apr 2019 15:38:11 -0700 Subject: [PATCH 25/55] Update configure-microsoft-threat-experts.md Added screenshots --- .../configure-microsoft-threat-experts.md | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md index 3e1dad3e1d..8910997f1e 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md @@ -34,15 +34,17 @@ You also need to ensure that you have Windows Defender ATP deployed in your envi ## Register to Microsoft Threat Experts managed threat hunting service If you're already a Windows Defender ATP customer, you can apply through the Windows Defender ATP portal. -1. From the navigation pane, go to **Settings > General > Advanced features > Threat Experts**. +1. From the navigation pane, go to **Settings > General > Advanced features > Microsoft Threat Experts**. 2. Click **Apply**. +![Image of Microsoft Threat Experts settings](images/MTE_collaboratewithmte.png) -3. In the **Apply** dialog box, read and make sure you understand the terms of agreement. +3. Enter your name and email address so that Microsoft can get back to you on your application. +![Image of Microsoft Threat Experts application](images/MTE_apply.png) -4. Enter your name and email address so that Microsoft can get back to you on your application. +4. Read the privacy statement, then click **Submit** when you're done. You will receive a welcome email once your application is approved. +![Image of Microsoft Threat Experts application confirmation](images/MTE_applicationconfirmation.png) -5. Read the privacy statement, then click **Submit** when you're done. You will receive a welcome email once your application is approved. 6. From the navigation pane, go to **Settings** > **General** > **Advanced features** to turn the **Threat Experts** toggle on. Click **Save preferences**. ## Receive targeted attack notification from Microsoft Threat Experts From 3432aa218de93f9b413bb500470d41414a35c433 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 29 Apr 2019 15:39:43 -0700 Subject: [PATCH 26/55] Add files via upload --- .../images/MTE_collaboratewithmte.png | Bin 10602 -> 10826 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/images/MTE_collaboratewithmte.png b/windows/security/threat-protection/windows-defender-atp/images/MTE_collaboratewithmte.png index 6c39d3592c9c7389103c81d053f2c07b1046d03e..862c5ffbd7d2f21196ca8646733e66490ddca672 100644 GIT binary patch literal 10826 zcmcI~cT|(v*Dhn5K~ctvih!et3JNMsK|lp5(rf6bNQVTeLP)TTprgRh1q4(&p-2r7 z0y+ptmy#egFi1;)NJ}IkaQ8dEd)K=6`|G=F&9@f%CMPH7?6b?WpS^RQ8yRTr-g$H< zA0OXt9c>L0KEACec%Agi4*0*}^M^cm@Ox`p`SS7Y`GoxYDPC%iFbw|er=x%K=ZS41 zhs3vH$xpxhGj!9^@4COAE5?T}uc%!ch6MazNW;n3(Z|i(&kcj-+t2^oNf_UWjH_e3 zgM8dvT>bb81lyHhbk9GdK2CR#smJ}?yqx&t*@FD=2|x0QDaP3^@Q#lYpPlz6GJV%S zi@W(cdftJlK77Ov{-6cTH>(CDU2tW%?1P3oH6ZH_24{X5zh;m^(j#n0!r*YTbxh_#S%v^zk6_;=ys(&56&^C-=wiLEcu; z&CJX!H*=;D!}49d=Di(xiXN}pf;Eq*LA}uQ?m-*mo(fWGGT8QfE>Z(r6&Ye5Iu?>q} zT|D$6ufE>l(Y51_oVz8jI2_Km<+X2Y?&R`XoVK{Q&Xp@yTHD&nmLz`tCB#1bLjJu= zc^ez}Q?WX`1qF3u*75bQkc9qGIOszuFOwap@I4|uqhzdn=thVN>#L*WxpRIY>DuDu z9{tiH$^m*b4wdNFtFJh#rN)Wg_xyL!;F;eJ3JDn+wQBv*JTXWLEFKMJoR5!>&&$r% z^quZBKmM!sk;|g0A(jyl5wKX_moI8E>|8jdHX_cvskEYOk853;$9sC z#@NRvoUtc@<#=8&uL-jr)|swWEaVVkteYrJu?rlLzq^*Dn@GpfxM?6dYknxFs7P9c zx6&IUy=t4PinCTxQGvs!>v9ZVUw)gNEpgtuTsx443v6|Q4Z#rQ=nMKZ#uSzGkSh8kcR5%Bg0Gfj{*Z>m0FN!=ILgpeNz$V~ z5mfzC{OOI~bYi-uP0{G0u<&pZ^1&xho*X@PEKYp;lk1>^vq^fA(b}J%L zsMA6+_T`n)iHSMG!?qqaTeofnpDL|1H!`|CPXMO@6~!F*Wt*H+>j96{{ihAIV=C4g zUkFh~Mhcgwy9hZsT5D@-k)m&rZ`Ye<>lx$mb^foXET4RQ6QY_fZCiEWgi1q01BhUD z{MRpIV{bqzc~}e%p{2CEyj;k8bqDAC<84bU_^zv*dlr#MM1f!@gWv1n4<0;trAO)N z)q>Gc`{s*a@!h+3=e>Dz4NQlxrybqlP9u&R48@%_1qlm8_&IALL7au+V#jyJ^PRT~b17mrng77_Or5O5tRbyD*A_H3bQVvkf6=X--7g+j@S ziP^WhvSO(?qPDRZMd|I$2p0|3eru$ij_2edwq>ybK>iW$hTWXO{<`cawGGQ~K`{#* zo#&Av%Gub3YAx_?cQ?0gsp8squU{X7fIM$oWd!r8AXE=TXs!xweiu{ZR)XclAO$lEt|90}WB}ef-VJdI68FT}uyHdTx(jbCS9iGFQ^<*LI$G=Fp2-%q9yX zj~TsMK_u$NC}2hl9zFVr$D?hMJ5!ZU*VBr@t^_0`r`o%tPin2u3B~mGB-vZy`y|hv z?dGg94uarao9kUl`1PttF}0$|$UP(A!r)jGBn0_TE#tU}e&T8MSEPnJQtY9WY?YHVx-Nhn-qeeo6FDc8~3pg%M- zs7hc2*xB^>uSO_TBK}8%nES$THD^L?!|~KUe!#bOdJBDSt`AkWbdb{5cjmAFeOhg^ zdNgENUxhQ1VO{PT-I=CBup6IQ`8Ml_0Q#ITL zQha*4T6Qh}jwed~^f>X^B$qVAKLX|lv(h)$rzNGNVrk6&wdHC5rEfaCQ6?|Vx$|{i zZS7Sa*dTSPJt+f&W7z!Bcz3YcH)j;j^)g4H7=3xB96G8#e`(1lRmuMrfbl>05-@MA z@?-4DAQ6*(NZK|Ry!*6MFoZY6_M1feU?h7iae4Wpj7Ddo_O zWs-9e5)SF7tBy$K$hvgSbZd!GIuvQ=(z|kaTsA|f{>Rfg-aLkoo2$)bGy6*%n^%yH zTI0?lo0{$@0K0#9px-*y`njvCKjxIK-}kZWBlnv{T3cF-#rJhL2&$a}uh$m8d!E7O z7V4Z(Qc?oA&!G@d9ssT}nScL%clVw>^qKCAn#Cqzf9^a{>cGy~vM$x$@rLl#NtsY9 zA`MT<)NR;}DzeQ}9DSh99>o^#+_g*o^5tBO6K@|s-h$&X98ds!2oQjC!2|s&ptgj(J zgZLzAp+;9-UHz!2sKx#JC5Z1Cs`1S5^$xPm?Vn$b0sznU<}k*?#Vmq?s>Q9YQ+F#4 zzd0ynF;hq!HGxB<29D+lqpLn9?=E@w?uHbq$jsO{+PNb+OL?J6T`Nk|9Ckes{p`lu zKkI%p%Ct@|=fSki4d!N%q3W6jWFLT%o#72N^OZvdza=}HL>QgP{Ohk99jVIwbn_JD zz#@wR%eS|^O;A{{oNboGyj^w>dlt??eYEvwzqzj$?P?zwBiVhp+IN-Uz>}N|p0dk? z%+vAuN-t-a$+ltcg_ouvgg{3Zpn^^CuwB9eR~~J2qYdPCk0pq34#(|I``~A z^<<^6fX;wa3~>2Ah!Z~=j-6LkW!W4hW=Kjql1=UHbzHRtc$50GR5teHYqikP#WldC z0ziz8Bw4NM>T2tHJlWmdeWg>G>B?Rh;dBPpWq^O%Re4{>;cynmg`%2~L@A7^HU4

E)3a z>Fr$rM355oS_6CZk~=WZA?X&{ldS_sgK}zWYF45)e?&>1Ib&pQPH_@Jbn|EDH%`UK zW{jT1!KmiK5BD1XI0(2N2c|hs9KNgn=63L-cBSVUH-G`{I&=;(>MFP*{jaCHICEuP z2);1@86f;DWMcgCn)5R=HJD^}+8)uXxx0jUU2iRj^{DPt)3Q1i|CJKTZH0}q`@9*#50%7sd z3%qim%msWfU5D^da1Hw51_*BCvBCSlNVCaysEq+}=j@)ag zMgi#%_#^|uSyy?#b#8z4wzTw8>eV0)3fSi-bWGjj~=>GOO38yY|;HcU9DbB0tVc_bJvrGX_bvcQL3EJ7hhrk?>U_Q`Xa!A`BAbBYy$)c z32b#il}x}~h?(g$tO0OF7?-jr_yRek09@B=xXPFm$fWvqspLR-01zR?OtM;N9U%Jf z-0V4NX=-b{)GC-RKO;jOc;Q)>UFF3dF4@7vdPO8r8C20gQbCk)BujJ8g8x_B5q~U zdC1bp=naUS=zzD<*Vl)lAz1}miLU1b@P_JnDSwT>N0V1AfD8Nk`MLHN*#-ao{B&G; zdhrmNq%T8WiFwzZ3s{mM<4^?14McyIh-VP{AT)7Y7Q#pp#5_xO=aW1_BKe{`~{gxS0er+MxWI6blFtR3Cz61SAu?B(jJ-Eyxd znhFYm`9S?F-JUhx1^1<5>{i)qslx(FmC8^c04y`?GRMd7c$7v!9{W%ENw zi9J$opO`*L6BijN4?7Dmt=$DkvHbS!Z%7>lg#r|o33x6s)COu9z;>jd{Z=?YoPB#~ z4bwV2*NlJdZ1EXR2Q?IIYBTA+iIYLRxE7+jVAHTQO-eSTtrMp{XWumPVIu5*&{N=*OMpv$PsEl1O`}4>y=T|zHds^b` zdwb*mP^PsD?o6?7f1L(6i|oHPP_HXgi?kfmkZA{;osup+wLc@yEhMFHDTuP$WluGogWQ4rXLJpZ+hg@nI%g+IfBLZw=7 zLS0g3T}&q1Ra8_^X#hIz9v*E~_P)MlmFSV+f!Wl8vIzCRM8_f{w9^`_PO9x`E{6)n$`TO&WP#t)B-x4Zsy>i*4^U$xpMw)KAe+4}hf1?#U(;;p^B3e#{bE6CUpZe$K8 z`00(easC1Z3pEd_gCYs2%K4ydg{`Pa?w|<@mE+H#;)=Y=NnW2>N(pD@XNyu2+i+1qH9aV_&p*ny_ri-~ZZ`pO<&!zNviLZN5>d^XK)~4qS#b0cmpopYKYZ zYi0m**q+##o!`a87x-pN1K2c(?!vx=v!S z>#*UyIR>e|xUkS%Uq2!_Ik~{AzrSB<-*d~hS2>!_%0S?OA(W~TnY6mv)LE61P!tI6 zec5w+)>O+T;7VayLZJ;YzpSh`nhM>Wy+O(Js(HXGi$d!xVES5C;68a!x)Ur4eU6oJ z&nA-A^^__xH1uTpSySJFFjD(mb6oyallXXLF?8LUGw#QDIF;s@XNYFuYT8^V`R2&} zJ%6iKCMO@2QX5(Q5aLp72#eHB^w+2lRh33d@CR z$KA`TVne}DRlm#O@-Yh!55h@9B5W>F#;r10Ekf}BXvD1;Fn^)bCCXE?Ij*lvdPlXy zSwe_TMToBMi-Vt1*5w(bsG$*qul0)4K2SbZ)RBu`@t}=iH65?gl@&ed>_A&_*2*yU z4+zLUx1W8*Lk-Vf%vMsxCQ}BW+&51+jERVb0v(u*NGCHNoQo%Cu6lhpzzTV0z)g_AfwlAzkimD`Es@J`BtNi|i zCgCbjdGK4%YTv-XY?XwriMsj|=nt8hnr0vd+sMk#(aa7`%U98%C{zvY;nvM@18Ig| zd(oSt-%?1!bJH`fleeoFY1QHHF|s4oC%)*ru^hvo?G^nh2U`H3GA#%<9)@jDP~iX z=KMgJmQAH+$zu_2OD~nGaNgsCx7B^H8S(qWEM^47jBG z7bMdEMmNbZY4x=3Kb=~;=ydmr^77om!j9H1_3%AskL`&v*-~G3=9Qx-2GbAKZXr`y zSy@ZqV_D(=wa~`g!J!zC#Ky64e$C^hg@wdSJbvV4vYX{?g*l-d00BZl1ftoI3m-Fi z+4;4#woXn?ks%lS>uPES-M5t;Ipivh?JHppD}i98rs>7?Fd+vUXIF$s@+B*(MJRpwp*DB~v@?M%!Aw;C52z)RvTv>ID6| zOq)^9q1quADh3*@(A*XIXexJ9#CQ}4iiNO?;H8c$-$sc?@}ueRTri1xoELxmQ6Q&r zBHB1ST2#r;^%JKpQHIF6qh`-u^ctz5?ET_$^lz0kT$VCsc&$8i6R$NC3j7kRj8Jj{ zs<<*i-m5&Xcz~J&L}9Ps#nL;P=&zVtFSW(r<>yOkDW?`~q=cWz8`LCu7P-y7q;3o* z`FPWAr-XYu)4(K11190TO&^t-?J7sFl1^f`>f!q-lq={jka{YB&UlCcd5WyLjUmlt zNNWxmfcY~FA|_MGot*~Iwt1P$cFwKkzIDuJxFPuOl|z`G;vL0SXL<;~G@I7Q=jG^< z?4Y%rQLE2s-|UT7mq;oq)-*Sd-y@>*?ZGRl7AR6Wc^Tu2qeQU>bCcJ&E*t#=+J%|Vw7wvOClMMRH0 zbG;f5uB7DzaE7?S=B%p;)#<|#7*q5nAJ5+iOJS(-Y zaF1UN4LsV`+6q$(ul3qv+83kb=Tj8CdH_Qp3+~a%umoIy){IA2n##%Gy@0v}JfzK^ zpWm8~I)DCrj{!kMAh7v18AiTjM>E)zttY%lD*_{8? zV|xhY<$cznYfF>VHK$Ht?i$LQooj zO4i-3W++Rb2~Ie6>dI0NKE%t*3(;6XdLHVB4|~!+uza~`MdN6+wnkgRdEaxrpjx9d z_a@nvbUn~`rqqxy(a$T{FYo1CXt51Z+DSxCF_u-UU9q`X8Jm$s=^V}+V)Qpf2%Fp4 z&3{eg_nx1dr$XlvTBDTFQS?aM5ZlV!JPSIb%`{D@!!jKb&7lQ&@OV^ZD){#4^pGA- zXF=j_>`05|-n zbnw3>NTMRmcS2{B)3{nEO{?t%h01Pv+>t#U?xj84C=JYrsEn`_$u{3zpcP(Zu$jzG+@h@kAirzYeKN6BYbtn?@D zRFSM@-MqZ~{R(gSc+$?u$Pg=sC=@68Gl)WGWhO<_$AS&q@_nN42GfFZ=_C?YCTd=0!D6W)=OMm;uOE z^QuZ_UsC6z?Ck8ls{?W$25K8vPz||rS@Z6$u7{W3KkTO8$Pdwp7sV!JD)$dhzmL1( z&?IF}Cg#XfN?vBERzC1+ltm)51|On-bn3> zf_ot=Xb#_YRvLAcQ+k({NlHtMkB2s$zQxFUHZ^M~GOs>yXezRzUph-QzGnWtWCTpZJ897 zQ$PfVKwZz} z-03*wt`VWy2w_F{iKYmEPT!Z^q8?WIzxy!*vX0h_P4ZEWxfNLCv|QfF;5Q!r>0SR&po2JxL@FD_=l_;8ktBgFUl-}BYYHBH zRoPZMblW9NzB*#k`OAiAIPS8IgmX23zi~J@@{mSEfTNS*Xuu^qZi-hhAbU0$%eE$a zW!SOjr%BaoVr_b^thA-UL2HJy%1A)_MvqGEVzSDaXBsEm#4McirycnZ47blb@9gZn zsP?8pc>beRzR&mIsVi8S*UH+p!`$YQ!-iN7hvvhGX4}8pVb>nq?;3Bs=pZFA`ThgY zMJU%_9)95=85?wG6#qy;rpIMpgl3_T)2WD=oeKaUbNzKAlWmDnKSo~?4Ew*=q<s%mn76(l;fC0LQ~ zH>Igy3nnU}7Kwt2Rj*59YC973=2RlkP=@*nF!bWp21c)D^?<_y_G>Vxg~G3NVt@a-TvJzv|8zmY&C|aLUwiZBP3pyS zmhZ1cYk#W2%PT4>M|Rbvk=Q+UoAbdj{cJ#=yCAN5Eq;`!_P zcPKC-S#?F+!*kQ5BPOrrm6ZW0B5QX&y`dDiFq}K2Gw626qtnk-Go{zzApx z13Z^kx`ow8#&fS{99f_Z3?wN$6Dv$h8Mk1iU;+oCSjXGT%UFTqrTQeC@WPTpPyCa9 zz3Q4LpY+&K_Hm5Ka^kr6SL3d^{nxaUn094OJ%8h0T^PkiF4{Y`KcRXwW-_W{q*D(# zPhDmg+?~SeoOLm4{j?384W;+1#DoN;F!uo$8U$rom|Rv0uH6fgELE^7dyqz_5GY^1 z++O8Wgt8^R#IE-Fe-alf>Os?7-2k^xf{G&+~s%);MzsX5w?-6FYi*bOOXSp_kPI2xEU+$ z_;Mtng#?McT=4@?93v=U9a$HMz|ow;6v|S8x-}c6`^^{I<$F|;QD26?*I>zdbzd2e zc_D#0BOwV3wfBi45_TD0%{cTRjd*d|3JMCS$z%2$C7Q{M8Hzv;Z0})fijLw}Y zL*&5Aj*y%gPlfFNj0>Ln2zl@&`>1c>;(4pmdtcY@fBPK$TyNJyepb+W?keS3NOgez zC&6m_Ju>)pTxm^0)V$C4lVhV*gQ3qh+}%>Vb#C5#y1J=z<=n4u1)@VheSFI4ZiLg1 zFBP5bW7@anRhvbu6DeIsj2S>O(U6q zyC(NH=X=fT4~U8C#9}#i6xT$s2>qYl%)_=%@2?>}n(v4IXReL>H!rPR^M1E~Y>FFu za)0XY1nPITl!Ov;MdpM5i?o0BR?Aq8KvCLelaSmxZ)fTndhOuAMtEqsb_1=r>ckLo zYwE%kyTp%_(F3WYdAQx`DcULVuCgjT;bnl+CosZP;uatR<*_>*B zZmBvNzo-=CZUgQuU3d{&8Bz8Y-whTZFHYFpPWkATx%*`p(P5rS=_lM zmU^T|MS0USb>t#kt~kdt@3_iigxdDS9ji}BJdg`ZY_5gEj~<4Gmn+ScPHNS!i#fTg zDQDVj($xyOxR3 z=jUkgLcwr3!i6{K>!s7J$BrY1ge2kye{(xQnWH zZG^&OsGByMWis=sn;7wY!;FiC$qr|9c830Di1E*M5JeWF%+>@?ORhh?it}^UR(rsG zy*ePGIOQ=>dL-DHGPjqhcf=t%DR#;CWbex-*wBHD9Ok*6W!jI&JAKzV%L%fMhF6hO z>&(~i7j3Mh-90$3(_g?KzAZD^uU7U ziqf;e8^R7>);4}m`_U?(b4yr`7u0ryM;vl-Z7BQ=1aj?5lZNH_P&o{Vs+!OiIi0+% zZ@_}*WzHH=5_cAMS*tGevYF%qf5M9W86?&F1bd0nn`OR;`yu|+vqRtc?u*G& z+Xq+e`x-Kke(eP-Tg8tQ*WNVRTD`Jn2rD%`O;($R&BTO#?Tvm0YF(EDNT z2MPlYC(+9B)}~CFR@7!*Q{z3H?ME(Nc^v#mIarBph@ihXwOYJ+-?(&ru9 z`TwBW3-K2A>HX+Z;pCP&g{G{8(?-N^rAIQ!6|BFjmoHadafc=>?e>QybtgXuU$nPB+6%+Qx8v9eSl@}PU-R+~@%hS^d`-D$f5-;;t1d-tL=r>V+ghej*Qmj@M5F1zmRSmShDe9-lI+`Xid zNtz)Jk!Dt6S{)%iTwHexS8`DQAV=PE$DV9L4tTexBfmauzJCV!{rm1wB%)l(NB>`( z-ej1 zyVlm)+M3YlDx3fDJ%j78RP&s;u0nPoE0SwM_WXzm;pWM2ij$ z5!bO}-kUR1C@)pMMH0AWn~$@nlH64O<>NEONMOm)&~zB%r7YDyT5hUtJv6B z>C4K&i@8Z}-WVGhWx`HQ?%zR~nmQ*EJu_(OH9#9E7#JNb#Lf&-Ut3~oep2=cU0Bgq-P+n(KtP~(dO8qa*{Jy^TYrPLA{4o55|fmoz|{M}}5p4^-q z4L#M>%*`}Z<0VtG7R4xyt^DCqUI)!>Crg-XmAs^D6x zrr2V;?YcqCf!*6qYN@8_1qB5`_@a6qzkInb^7(Vk7}ya+IZjjTKy(XbVO3UII(=;| zbY|(3M!crf@DXR+DFw{L$x{G+wKy_~7!(7YQEXx4&`lH0o-fJpuHaF;`GtoA86 zcwBO_5Lj|1QQNKg`4I?Sls`XQ%a-c<(@}9H_H?P4_Djuw-<N zO%;iYi_0St$uz5tX$>_42%Sji?<-p$TnSt3(Li~Bzl%~*qAatqW7r|;En8NM>dN=c z!YaW=PEJm!@U?12BO7CEYFbcKq$An5lJ4v02mY>bY~8QI9CmsEzXr`6^R0Cn4bf*p=7B9^Vojb5Ivh_irG9$40i^S>E8lvGV?`#5pY(2L(6l})!=_s5P zh@{PJtj|??|G0_`2)G$jg&E6-aC0Wq)-%9au%SwiZ_)z;1AmbPK3VF$B}twAR{peQ zLj2shzUD~5gAwYBB^#^~l+Vw9=_X%#S6nPH1_rR!rqt#%qk}L7B_-WEXJNx~%F2aP zsUf-xQ{99cJMoJdqSRllv8*vN$GTzV=d-rp2#m@l?%xe6~%+> zn8V=+2nqFX=2dr&|gq@Qi_n-dk3|e16L`aaZ?3GUaP7<1p)nYP_cn9; z&owO5cG<4n9}j1HR#sM`VN)iGDJmf*(aQ5rF!g_KK;=RpqPDTxy%gycdhO)Nlc>Po zZ=*!jivRMZbH`VBXsq6{bp2tgHukp6dEuRzO zu}oWHa|Z4AKm~wOF+{3#m&31zY8jx>c{gs{@Sh!)vc_|kYUx!YK(I@HT1022domE* zmyBTQbb7PU_X|u*1`A3W^FtUl8URg!BS-X=MNIG9dDpl`kvs<}iEzRGh<`C^rbI4S zRo{;B-{35}Pj#grF-F{)DB~i&cRPYwgb|!Old?uft)NVz2Mf(p7sN!O-Ql2?!yGxd zdmH@yi-S%DveEIEw{>-+=I7@tAbk-l5xQ=dBo;!dAlW(iWIX-)Gk<_ViV{v2Hy)I8 zLqj7@`;@VTMgG=Z{L>lHsxjm_Qy(9n=EY`vsm@dtOJ0@57m)HNTX$vy(ojVfl{ZU> z>$SeVzWy!3xar!N;&KyFD~PvAiA_;V%>K?4B~!$!NNC}y4?o{Q$P$twu6wF)p3=UQ zwy~PV`u&;L*xWo1B*E=7nU-D+14$NWe!})`55&dAdqD^k>X(5%t^@hTJGW$88*_uY zGIq0AI^S8Yg&V`hBh_%CC3@y()3YQcTrrZ92t%GFx}+XN(l}YsuW*PHPFzavhC^8# z!%C|xwdpLB5D%B0^y^UA5xC8*bXKOs_5`>e@v--h z`%4|V(uoz>!p##tCu6lv?vL0pbqgtwo8BF%6ciGwxPK`>|R@ z>Q-Rr!70^cMNn1NP$EN?83Vu;h@|nG>dGrCGuXU&GZf_`eQ&f+0o}@lFg;pi^iQdo z6j@|>Un&IdGcGVO??&WV=NkpRhYuePPSFc!P^rRJemq7JwQ@8>Y`=a`Pz?~av6)$} z-NorZo-XZsvb($znv|20k^r5?*49OmVboiEZ6SdE51tlV^?S3rf{yO}TISTgI36-b zUHLOnyF4C(0D$kbZYC!+(PofL_KH*o!_V23$viudtcD-|!vf{@78s*5P0beM1gY95 z0|<9<@{O0<+;{_PQh}HUtYuy8edWP}2PPl*pEdQ9$t5!-M4Nk;?X-X2*%Z@m9X_IZ zvU3ZH`fGC14fvJSX4+_fL6Nb{M(XF!fA3IP9`&;*bBt(QD)MRt;Yw}{qtWTuEw}k} zyw39*YG^!0K=5(x1hA|4nKSQSV~N!4H%J;4R9BnzW*t>jP%wp> zsI%IUpjEzlK_aa?r_z0h7Nx|vt)~~gzM8gS4nED#%S-%tc4Tre|!rf6)JoYkUFB^)i_i= zENc;sI8tr>PxQg)mP&vmqR#E5G*F%8M$TAO8H+dx(OGm{xJtegugGYcpXANb&{f|( zJUrq;JnsJf{T5ATNk54J2 zEy60uStzW72QHVR-YM$VT|W92T8xxSK3AcH2hS7{7FjbTmIVUaHvI!nb2R3KM(VD1 zcBiHhBoxq`Q>4i#vDYR0FgNvl=V0;hSBDzqetYh~+e-5ZE6 z38TKxkfI2hfh@(rfS6>>#}fy_zab*A?&UxpHEQELAX5p9q=*N^WDTdpG;1Dt>- zkz5n>s@De~km`fVnT)Z5x$xz>om(~`ECgJbfBhN1R;{c`XKGh(uR)Pbg9Q@1+S*zp zOUpODSXDNT-m#y?oC*e!D(5$;-Qss;b#>Kbud#_qHk(nWS5#Dl3SD^*ssLzqsj?(Y zr~UN>LoBw^CTz*LVZQAgYt}`r0K`RSvZCRiKr0X-wG&ZFi;^4jlB|`9Xv5+zQ^;%} zgF`lfS1w$*0NqQHf>$c0jxNt>!LL2O`tAj$hQbfc3l@t-cc-ebXr{#c`}a4EfwK{X z04nX3rkIhjaTd@CBo&nqK0`oK6WWsLhlgxlh#`EFgw_$;kCamAQR5y#^Xe+=#xd#t`t=3) z*P#x84Ae7Nezn!H*JANFbi}T%ni1-s1SnF(0brP-#hU^PbtaR69m_fgrO65u*G3r> zDjymGq=8yyj3I?2oK3)6Zr!>SFbojz{Z;ghaKuM?)vIlEwk15-`Cu~uYb#)P&mMD% z+eX-VaK(3Doi|5!4mFyc&z{3?um``y3}uZYu%_CPl=&X&Jx)(Q4tj!X){8Ut^()X()N``Cr{@5ZK5{yFoSI)*X}q+w zM4O$}UTst&N>it&znF=@Monyz=!B}O;9D!F-@bcyY^K(!CI1=D^lkF&KnH|2X40p0CsE;>UH!L-eKY_O8a7s!Fsm3qI&CRXCb3}e-i8{EV z{Rp-M4NhKF74s=QqpE7KlruT$40-K2R*U^KvU}SDH!rUt0CP+I6eH8f$jEi5*qU#A zD6SW#20wq=(}zp1^=93;v$4(@Bx5EIYjcv@9NauTjV}oWB#Y*Gd@H*SZBN?md;@4; zhWhl>ik?2*sYiDA@G!b~Slhhi`>*0>e4Tz)4P~C)GL=WFeMg60KYFyybNKxaKF^FX z&udjfrP^pc+*tA%9C0h3!jY-^x^8`IYZXe^GpaM`xw;B_wj8D%f_*`?$+~K%kZRgi zSNp@;tf{HV@WpX2s0{Z%em6Req?u_cT57-3qir%{_ok<(ZyOrMF5%7`XhVG|)9X7c zDJjaA1(87}2)$YR4lN7wvzN!_hK7a;ii>rDEC#Ct1qDIb7Ii1oU3ON2g64)sm)a2K z$m>B$G6MGal6UW}yu1Bnr)p=)T7JH``!7c}lMcc=AhWWp%vU=#8-=OU6ibJeE4Qeq zQ{Mz)Oq-eMOOkUJYME_xr%0&9MuCpBSaoUZ7b^H6A;Xr+5|1`=qI5k*XceS;>JlNI z^~;%@Qx^(iD&zHQ{&N=?4h01T<@0^kyd5D-mXWP(Nm7!4UWOciLR?ak5LHrBV-D_6 z3YdL=9Z>dX(}QfCJmXn7AotF$j>>6g#d3 z!6&H3=1FAQlhfD>-;&*9%G%QwKrZ#ka)Tvy}xJ}eHGbDnQm(OoTk`A;@VH6(FxU?8i5&^l~dyKo9}2KPf} zj8uV+1%)niO2>vYWz^z9v&m27%Ju|b2^+R_mcE%wH0NS^CQSrH>*lx#8q(FQl@i_h z8(@1XDk_8F&F*-*fw1W%p{l5n)XB0k=?gaXX1&9;FWmYEQcRtdATr_w)^!1qirlkK z@ffAagfTKW#jI^j0y=O&c+ouQ<(-c|1DXtRIKo8Ic`Y3s9mo~~=tM~*lF({=eyTts zEhwKUW<2s8qcqDdn77-efh{_MW0S914DD2 z?{`$m!^6{owzWoAMk7;K>%c<*#J(!ek;1pl;W7UH{?B*hriL-UNgc|DY>bPKpBXN7 zKtzIzOAh2qaB#2?HIPNk5hmZl?o;rK;uTSzc6~2Raq;vl0!Q@s^xUCL!Km`U&WFus z@7XG>PaalMQo=$fH^X5t7*d8)vrbiE>;O4=dAFItqCqQ6$hyEpT-**!mTk1Rb5d9Q z9`^Oz($XGr_Y5Qx6tus(&M8Bc&reVP^pZEbYiMxLBGOvEZ?)sPE(@Dc=g`9AF5w5# zi!?GKjE1y3!dG$N(4m5=DihEIQQd%NB^nVeMjt6xr~sOaD$`R)3vP)Lc93XGq+J!C zJnq!%klHD8sMn*b(qsPQ*i>g#XE|(hcaHt%l=av?FEjF`k>O+KimEdpxm6I$IUC^ zU%`3IBW!TyKri&Vl>u~%neyyN`6am#RNwIMC16+i4(;6`Q=hj3*7EXvD*C82VvTuB zzGp@IWYX)dKzd2aS#F#LY1Bi8&6u4v0x&}CvO)0zFSlS@m6x67>)yTl*s~AeR1nZb zVHFh>muUAJ=w;pMhrN^{BO{|w6iQ+(j8cGoBlDJ>pVqM_?ek~QfM}9uPQldV>Yh#@B;k%{);bRNd9aixE8D4ljv*bV$Q?{Noi%_VX-~EP z`u_0&vQ@{mM|%XD)ra!>2M1B&#?WlBSgb&RW*{nXW)B&Fu)fw*Nv+Lni6B1}@$1!S*L<-kOyRU|nP-x?XN92Wn{`uF{ zV=%$^deh;OP}lI@M84L{A_P`BfW-3kjrn#-sCSBOvp*h-R<+euR}a5Tb0&X#J>XbQ zzGGYCOGzlRDR+)s!s7(aiHifm3-9*Ycy;^<(P6*7V2SJ%Mq%weE8tfu?21J2A}8qI z1Il&BBXjq>yi%GmsM(2yHws==iNYYz|dV1bLz+0AOBIkAeZ5eY>xbcLS*H1tb1C!XOZdnC| zbBA|ZtkSc(wmi6^QCmiTo8{h@dCSRhBjod=J!fa$Qe{aC#|PFW2`NI7MFH6|m=asq zg$ZQ6gYBsomE{CWBq-1&16BrBtLDnHvv0suCyE#ea$bulQ9vSDoZBnnr3Cc`hN#s` zsjD{fv)I#uz`Z`Yk3Qcq2I0KsQ5%fmRgd(TvB~#4KDOR6fq?>6U~FT98LO5-$JJ9@ zvS$kPjg2Xnc-Wm|?Nl{^#5OG84irUb4k#3EPw%HMoSW50D-RvQw~OyB~^B@9nxMrLYTh zdb7WnjIfv3{v(EZz1H231r<*1`~{d{4RWt%OFucHs>WtyH`}OYaL@#Rn=^*14VKWE z4UJ8n`gf^AOY<21)DQ1V6h$j2n^i*6t^Q$h+I#QZa2qZ6mB`shpt17;J-tr6)NEep zbSGo$1(_gaMftRCFli3QhZ3~!jSo0lY|)<-)0Nweo+=iCZ+Kese_ZU|leo(;8-0>N z&qnn$7pyUk=`LH18kKn(bqJHd5)j+wCyoFbX;kVFnd1Rj3D4|8Lf8q^2h>1CpV1&j z<9pBXdUFKN5LgGE%AvBPoz&EZn{pI8>G)B3oGqKh5;ELm;3N6rC8o`^3ioQZK(01N z%rPcUA~23&)jr7>ag@~l$+P8j2%GWjj;*cj;E0}F+`RAWG!aR>q>HUhw_smDq6_bA zhrgJDWQr==kDrNlO-$&9IvAy7jjgvs*Yms@qg2IGNo0?{a$m|#I+;ioP!XJ~^-?42 zoF=!oIWS+&u~@+chN&1OXFL_tt1TZgr6$Ca({MI1FEwPx_R$WHCy?dc3ikBox+|~q zg-(TJDX?>slny7mZuC5BM|;u9QuR#h7KiLHQoD;ZODNW-!?YYNlTrdQ7UdW(_|N{y&=9CZ$3KW z*Q7c{elI%X$T;_Ap&0|jH)t=+tjBnG2+44?=S^H@TPzI>?1eu=*+jJbjH$bO!Nkfe z*)RG=?F^BVxT6k845_nK1}Y`5@=|0KXtU(X=ucVh_%Q?P@=jb!Na|qNZsx+6_SOz& zViHtkjd2*sE-{%=bty(u&Tv1ZF@$L>gvtGlGb!JcA^6leDIABxk?g|igE84!-;};F z%0%ZL#iL#5-T6*$0@(7S6wl0ak6WGF284Gz)6{ft)aYh5?0I-KD%jcf$(6QIT<2@8 zXYA~c6sDrYvVa37*QPVON%NI|-u#<5(r7_o;_}HXtB+^+_}(V=9K~f=+t@G??44}s z#Zdc_p1#6VN)n1J2^MPpBspJrv0(dI{D4&yr?6;`UZ=&OJy^(f_y9(<%dW+6G;dz?e%@euZC2`nBk3{N8 zrbDcR4qM7_Z|{I$d9FtG!0PCTJX_}T3KT|^@2@8l5Ic-?JLDb+b4#W4sB(xGIZ;LE{p|DV3f3Ln@6J9 zqZMkr4qZ?sPXSN5SRH8ZEF5&RL`I&h%Vl zGEr?KjlK@Gz6l;uOQ8 z+8dg!c7?V&N-GXTa9zZzMu_4Y1zt)H73Zyd?2AZvE~=GQTugCzvpxKLh_4l0Z8*HL zLZ{jhB-&(m&f@EKKG1j?BeN%3`gNaJY^Rq*SAGKRDJ!^xt-yjnetFuhw z+%ju9-q`L!c@tC9<-ED`N!)B1&Q}#_88u&(M8o0|+2!c(2E4_p$c^C-Z$cM*&5I$MhhMLPS0uRXSS$To^k-go^|M_xgDUM_P%j%^{H(WtY)vSM4A{fv8ukg6}FJ}uNJ&t)V7QrVeB}W+B*Ae#+h^e^&8`& z7Y2HRf>`CI_^b_c*0 z5`UiDGeae64R!tA5pK zbEe(c(Cj+N{NJtn9`f_&)?YG>sgOF*KbkJYSvkZpo#a9`8ERj=dbDlJMR%t_F_}4o9kF7ZANe&Xg~LMxTSb|?7UWH^@3FW}Zhd?;tyi;$(0IwVb?&_Byi&XI z;zrJ|#Fxi2>LlGb8y!u<37*zMI%XSQ8*?8k*lTJ(o~S-muXNUbDRy=-F|=VkWqko| z##Jmbv?infuKU*vr#yo-F4!>WPO!Co+j;KUQh!pALn>NYRpGP(W#&fq!FA?Fx~<;0 ze!5HJ{E>qc*3uzQmxj|KaFY)eemY=MFfQ+@FDH1F^AE?fMX@D>w=kh-k3zTa7JaXc zkNfHCL1~Qqgm+&*Z4#y(@eQ52bx>xp!&Eh6;hIm_(ypeMSMrxw&#KBvvgJ*l0WG>B^csVxy6-LDtkS~dx1K2-ke zC~fC(9W@xD%v#>4&1Hvwl^JM7fN(M5FOg9qR{qzFjdNee{mofB>3#o4!`zP*D=B|p uDyz1*xc|R14gL?Q{MTm5{~vvNgIBGUYj*$oPG^V-m)3P%_2R2`_x}eeZ`0iX From 79397150266592dbca112cb1a64e94e36697dcaa Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 29 Apr 2019 16:06:39 -0700 Subject: [PATCH 27/55] Add files via upload --- .../windows-defender-atp/images/MTE_apply.png | Bin 8892 -> 9115 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/images/MTE_apply.png b/windows/security/threat-protection/windows-defender-atp/images/MTE_apply.png index 2e6c10154a71404caf9cbd86c296dd92e8359a73..a7096ee4aa3c1b4f0ddd6f1d3b744bc8eb50469f 100644 GIT binary patch literal 9115 zcmch7c|4SD`}ZY#B`tT!E~Q15WXrBawvZ(nYskJcL&h@h5|t2zvW>D2W{5Gip%Mz& z8M`Eg8OAc!8OD35_kMoQ@BX~c^LwB7kN1!Ha2?liuGeuK=kfg>=hNGU+Fbkj_5%RG zrK@wp1OS*)z@IY*8z^~OKqv$MaQf;%0s!F9=e-|O(#1pkppYG^YoNtG#Ugk@RA%~8 zz`!q&)?MgT7}V9rA1Fk(>wuzzP*8NkDZtU+%@^wC;|(0+JarnB@86SO_wfz(cXM%t z0>#|z%AoYnFR8zi{hq1_)XmEYkl*0u1mAG(y)pH1h6dUDI{`MnyL;*fes%5^;OJ=& zs`>-C4;AsCm}5_DVejwl=IsJ};Gc;GW$eG(!~7kcfVJI6_Pg%7$VecEn{&xNKP~S)XA4ija(N}4SVk&DZRiD zVX@cxAo}D4hol!)e2wPX6%AWcALS2>DU!5K@zN)c#bB|d<6Jzq-R+Z3oZ-}yd|bMI zEqxzfxc)T}G0qzgs}Z-HFS~>rtr*M@$XgGVL}ZESi(Bck=cpZ9nX*&^aS4g}Kft-! zoS54O0L#(7Ou)&MdB%5g48=mbMa!lJs*AL%$>}hJw*vq}Oib*;-21jy>FLFaw)9wX zuznR3YTeg+Jboj@4~Q5f3P~kyX$ zU&SxdTjsBZpICu=0+W9=(5?c2=cla!p!tZ@f9wA*HJMM|xT50XTU=aRSBWLX#b#Ps zS{i24X=2vsTeYetFaUU1I^vy)hn=l#p;l{-bEOBpWcx4DP_^^F;Y%yImUL)R@))a!>JUCePv{@L^)_ zL54xuACnhx${G-fVyPXwV!1EMmnq_8cUM=Iq*Wyg{$e}tB@OyeC#_8RqPG@X#L0w= zj1nRep`H^=>_jfs+)+AuC4jS$nOijrxw}nFkYWbj+1`qb8S}RA^D9f1wiB8I-SX6v zr@lj__Kz-KzFZMZozY3z2XI`y6{!z{Ve6?Giv_v4T4@Si&!9>`gvdK}YXz_2oR{Z} z+y{ywsY(HPBO-)VWQc?qZlR}}yF>*wffWAu;n09J zGc%k0lU;}d@rX&}&<$9XoSd91b>>^mTwdB4UED-?Z4|dK8aEDaTfEH9E!5YOs}G}o zQ}mc_O|q=^&+X~$U7O90ryYDfFkqgPlHxH~YHwNT`NkY=UC1lz?Ar9~IMd?6w98J< z_IAK)L;(r2u(0qLu5eQubO)Y<8Sf~ic#TxLZ7xmL?5vO2bQ+|}>H0M6R8sI8w#c^a z8O4U~VXTLw@Fj6c$^O&vs_%|pG%u*A=)1fNin0FFdTrF)+*~~)BZ74J@`16y5wG_{ zp0?z#9UTKXx-Tn0L&Jo8&G_@!*N}E5k;HejcBdWMTB@8|;&ioJZ{FO8KbhZ;EU2gW z1-=d5Gg0WuPhHIP3YCiAr=57Q&fUXfXMl)F2FJ{yh1TN((6ii&=8DNmv11FfA&7-m6aHSsszs84iB$KH!x@%7HmMm zG3=y?jZFz?L|dxI+}zx{!7qVz>pk1H_F8irmd)z_<1=Thpo+qGRoqx$nr-N^*3d%W zkf%b470xhdA}nZ-yf5Ox(WFU}J9l#TOpG#GtuCFX-=i;$&)JwjOkA`+B&0e^< zDgnP$U7p|--w!TyaJAr?`o1Yn2$Y(qeaiz^<q&L9MUK>So~V4bl_} z>*}m|d3i10-+yYM0>)0u8fYPC)_1_Spxvvjd^wFODd~Uj)OHOO-1_PQI9p@T<0km` z10o4GY;c2>UL$=yJ@1|#JI9vZ>0DlzlXJtW(z7fy^FC;qe6r5ZGeam!8LGi1;2?X( zk}LuFL47W&p8_=u3Tx z+|D6*>BNns*@Y}%v#6|mImDk|U#7}9-uyyliFj}VHs(;~x!TY%r8`GD7^G$LV8L~E^4ciEvmb?2FX}5ziT2yh{9s@fec*cv-Z%wX{oXS{iX}q2 zj9*G^=i=9r+J!ik87MLkUP)N1GKA3vdJx@j<9AUZW5kV$?B*WWMxSh(5o32)tP$Znh8;<5Ezc$uFG@gCC7961t-kfUWV#+$hY z&<1u`+Q`kIb>(kcA2mo_Er|Y5oVN)ALvG~OKrN0TkgcutxsA$vG=*p?-xc!8ok!C4 zLeU*kb{k&HVe^V4D<`K^Wf;mS6YF8SZrPcxLYY-Q(LqKcLrtXXmg+W^`Lhf*;CY4_ zs6uY_pF1_tD{$K2xn#%B*%_tb4XVQ%(B7@o~~-wj}JRYspx3={)_`BBv$a&U%Y7E zK?B7@8FUTOcwCBY$*OIBi+>WPz7L-s50hX}!p3^tQ7R1$KiM<9KDsY@lD9u5E(Uda zK=K#eC<{{7rCnITQ;XcfYwelxMRY8+c7oZ{@dJz{+{UFdwO>s#-Rlrhp2O@>d>|Yy zV2Nvb={PbPe{N%EV=6zT+V+vK2ELg7dfu{wS_Qqu-IeE}X4|555|d9<=Ukyht<$GJ zc9wk)L9n9Kx)}SzCDs{u5qLFG*9=*`SuB&@{#V<@o>LZg$PRd~_;g?oGCJ?{o?I9g@iJXDJc$-uwJRKH8DA72}; zUS#H08*UcCc))4*oPy^EGQGI(7cBH6w1}10~651hY8l!xOZSHl`Rd0 z=Tl!Ls}B;fe`2FG4mq+y;9FQE8MHr3OFzBDiuuBlu?AoJD(6)mvyJ8DC7yX!1pNal zdgSC!7?;=BTaMdyS$wL5v6!h#gOzgW%IGcA{6O4%pnzT>Jdm-^pyV#f$;gZAHPhuSvm}jvXwvzFxb<;Q=`DQ)QpTRP>2f z9ffyDv?lld>SQX@?#lkBc*BXiHMiP!7jWXGx^W{MyCGdoGqHRnsEm-ty9ra$S9E*g z_>xL!$@|aN3#@0DN2@b#*qyXFJY%wx%RVw_f$_Mq_Sp2g@IYFItcmm{o{l!2p!dhX zHz%XleqieJA3kL)_E?2%I!+&K8yM`9+x3cqHVY4vd6$CTMmN~K<)~}8rg0*J?%{5m zX}j>zgP##{bv1_MEi>f_arf~u&!AqLj8m4!RjM!&mtI${cOp#mJ<>e7D+dA?wUT^% zYtJZ78xPQH*dx-QEWi1Vmc`VPj|&1msz zSj|lPo9sDU@@%valG|VKw0mE(A|n67OC(26o?;tWsN^`y#R~~lXz&F4j zNJLR>51&3tZr6gqgNGViJGd!bJp<;s`P>7$+c-tZojm=E0{LIcXF3)r)Ok`gV)kQU zy;1DBa4m#|QXdSC|DHC{mxAU!eoZkNE7Yc}21af7t?Q|@EJwjpgmI^zOGT?#G>sDW zy(pqhaJF+o(>r@Rr+i zTZ24|maw_GD}Mmr56ezf-;I=Iiz4v!RL72VSvb0}@CIC4k!4)x=&f6Im_N_}S3blF zY#vq-es|EN?qDt{ivOJJ$ojPSo6X1p#+FfPD7hp~aY9`{|8&>uW0~nw8tKU!isLo$ zxs&=n&Gkz~6U{f6UT`=N+nc-&9*q7lb*A0wim8iXII2+@)eu@Wv0@Q)Wg)WNtDUo@ z;7t-!=Si>&Yq3RHV53Yf^o^o>MVYcS&AkE8(J>a3N-jI~N$A`u{l+M}LY&5V24F?fMFcR*zFa}e$%kTr3sT?WW9`Y*`r7Y2$&E=x=vRSb$@0z{wvCwRMC zrM-+Bb52aFh6Q+{dq7#`QRn^Jw;spz?W%A94mM{Pm-4L+0{7CztQEXRPyWL5pN~p` zd1TCAIRD7$n>SF008N3()IDzCFYNwLoWM=3-|s;@{u}*E*?-!@N|tyyHcnWBBJZ_E z>L14W*s-AYMQpyhG%2bJqLAV00GFILAfhVe_M}7kP~YHS0k`_5NKY=HX&qCI8C{I6 ztW=2QS2V<8v8k8rA5Lu922URcA9VfG7bGkzbP_9kCe#(Q(P=D1|!&@E7uoBh^c3F!Au{dRpjcufWrnyN$pyRXK%gE8XdI;lj0%bY8ZX} zt8=;A@{cCVx(8)FJw26S@kj`;@NK#rFS=sc0goK&7`3XgC;7JH)zvPVfXqDeEJ_Oe(h5DAJNdA&=8r=ec zK-6qI6HaSaz}MW{0wg6R)x5a@hpV5W+9ElRL04yu@pMY9p1yv7S_24ObMx}t!Q~|8 zfB??Iz`#JwHvXG)uOx1?XT+aLB=5|9-0R+0#qsmCV-!+zq5#1RT|*KlOl51wuUGBV z)v1CA5Q!{dig=J*>H;pz|ECTJ2tgqsfMAEfySuwv2R)jenXyDyM`o9n-Ug=wCzs%? zJF6$c*nnm6!qU>x-mNT<+c|#xctY{HEW*pgimYQF0q<4Y5Q$+pM z|A{90ZE8FLcDpNZ6O$Z$0AM*{I{C?>0nqf!+OyvOfO7iRFhoW^vkl}pL~Zr~pK~4` z;8`cr9K@}27!y~4!(`FrXr;fAWdGd}{)T@XD931OJ$+eNt4h?)4=s#tVc{crDn&_8 zwhE1NSMTZ@vNKJkcjDbE3>rqN?i|x|zMvwT?gkv@eR@PH(Zp1C70Zebd&zy(xzhO? z!_p4J3cTa{HG!iu?P66iw8oJJ!i)4t+Mu@uy(y;k8~xo`9-AqWN!#9kMl~O0=m~KA zd;BoA!o%{4jXh&{>2=^8!?=lQiQZJcRiyBIcW&H)ny&Go{xL$HBEf5*no7ji0%OCx zm+rmDGfX3lVNba70W1lZCjA+qF#`=N&j{3HMW`-Uekzpskd?1%Ew8S+q-nXT@G5_0 zf5BVb)(+3!G~xN4oUbvjQZCNv;B66$%<^($S@SP0?(d4yrVH=nnqzktG3qJhhA%th zk=>DLJXePMw00&J7Wfn=y$N+A6O2dR84PZ|EQKBK&gj%|x~R6RKp|m9AM?>L*b;Br$WU(ryoCPU zz=^1g`O1>Y2K?!VyK7WYITv6vqkMhSaShq$�?b@GoD3v_S+lemvOhwwr%zKz*fT zR`^KD^g5x=-M!0-ACX^)Mk*GMWJR47Zes=eIi>SjmIuMJnkxj|`We^P6-KvS2rG1b z{ywTw32mIiZY!6gaJg5`MXzwcJJ_b5N1DW!_H7~6Fv~5IZB{tXC=lkOv`Eu?nbYq1 zEyEXYJM{A|;tRMc7Tw2>A7^y1J2^R_3JRXwS7R!Hl;1qSBlR503mi73k@4jP1z*-= z|1Z4+@+r6Q=^`BfRx`z{0~dz>nMzKUM%VdHUdthI4E=A16yeaXYR^8k~+T+pR!1O@Jz`e0l?=Ydx_S+qMZM=|NmmX_naC$3l9ma3;gD`W%o$& zuOD5WM(SJA+8Rg=B&)i-oP&A;@9E876+U&oYq5mw7O}5wz9VmU9*gCZn*HK*p%ssc zpNWsWTW~}ZS(;w`oKIfd1hy%+J0Lw9oBvF5_r$B2**7T~W-l8aqYVktyE4rWr|%X~ z5Z!1ha;KbU7(!>4!lZhU* zZL5aw3Jus0?`y_!nGyl%VQb>5bW%MDTpM%Y4*u*aB>NhFDx2+SxFznn=W>MZgB44AA>~{qwos%*=QbpqN zv!95%;^$vLZz%_$Z48K)SDQ_n;&|h*B#Xq$CYR;L10M(WW%Q4Jh3F-nvFQ<_Pe4bw zPQNPbT>YN<2tG?$Mk|_XFQs=q{|afHhdUa4)#>FoI<7;z#jS3Yzd^b=H?yxWv^}YY zh->LPqcrYWJDh23@*VP?9Q$A{s3j*=)`yqSh72TL?Z(A9}7~Xys`jLauLRloTtB%DVSFeu2B>TR*>s*~h7R zca|4A?`o`yS2mEd9nWl%5eP<32^~X}!ab*kmAF!{*P)fw2HJ*DHNW|XamcM(O_dUb zO1is@L6|opS7pY?kYqOXloH&aJ~Xthxf4y_w(BSj>=dlclJ!EWToHHrPU91GXqz_A4L931<1QYsup!YQ<>>Zn`yobdLSGiFT)Qh(CN)jP+}YZutc^qb zTH#!cqT9nO0ns%zMRfumT)}Cy8Ux_zDO7FK^G*LKWvL1>UL&*rO=YKiWANFE1}$ET zoH@d7{$f!6U}-&wCT^-507A5W;>GSMqC79?)r%re`}UH`nZ!yU8BL;=Dd zCTwD4I`t+wX+p@{vHU*2Uv=`>u9oD^v>nVP!b2)%iFMVAF#oli^VYeCaJ~s__g~OoAEXUya&sRD~bCL98k&NZf$J^%REQE z!X1nVE?(hPIbFMN4ghB&Ks-z6(SvAvhu11}O6If~nTkgeWIr*&}(GUQ*=FFMWeoIOptii?qC$Qxo!T4{fT?{JW zyp@&JX`5@KVBsbn$_X6haQQzM7yo^vuPUHZ0k;zr4Emb^pB1f+c!q(k`ASvx*m1%z$M^GP8D}bbMs9Y6navPI$HuF zD_4;GN4F3=GE4&k%A*eQ9{q>{KBR+cA0M&nCmJHvOTgk729t>aYZ8-<(ei=wcc-VP zbrUOnCeSl8&iVip3UvjWE5k^yEO4m-;b5KRdi0^f?Ck5Owd4BwE$k#~$M!UHb8-r* zs_wpd^ClUspsO6ZSxVk*jOMl)H~^HLr%2DbI6Jq3)eLY!BRC&IM}|s>oOgSnY5uFs zOmvxJi+fkrRj}HH!eDUi0qgS+Fsr|yre@O;FC1iJ!K((Zkg~240kK3srNB5_4!-KD zYhq{^*BmD}QqIL1asKEAi1}DqSwYZb3}Pa~4CUN~5ghsR(_{A7gqJU~WgMH&OG_I~ zwZx~K$xsStz8oJ=Lp^w2R@QWDYiqBlVq#*_H$G13_Xb;|tA6a)HPO?1<^choIB|mc z@|3}LGrv!tMFZ`Q?n>~9BRc;6LEH|YYG-h|jW;vf!6i#)Z~^uuAYg)gij3)fa^&>h z!oYpe?Mbq*y`Y<1+oG(jT$dbxkQyx)0^S50YXZPN%e}h*I&yx9s}1$_w&x7fZ^Pj= zCZ?t^a0lcS6)&DUr=2M0`(2X|3XahQ0=!V$mrCH50HGpSj-Rg?_)#a~qvzpK1PZRv zwz+^Cu>%-{KxgIf)YN9O&9k8&q&Ab^WP}rMqMDBWf{pK)BgpS_codKx&`HL4#!5aGK zXLDa|tT|$dl7qlKOJm~%G7%h?30T$mx1i-87XbF0Lq=We5U~8`ul(mvU?f-lC z`x}k$H}v$6iTwXm120B&s4V`bI>2nw&(H67HmP5A-`V-*KQSQsRcFM+{>nProKpNm znSog~{nRs{Is8&9i)@QvV*Y)7;uk-7vxWoE44oAHi$59NW&iR`;_TLv%v10V3ZScH LcmsXy-oyU|tAu!? literal 8892 zcmch7cT`hbx9=_- zgc1~xqev%&mPDi`A@pV_xf{=Y-#5m6W4w3nyJNgR_Q=R@&9(NNYt6OR{LQ&v-Zs_e z{!Q>V006iR4Rr1T09yk1+~?v15&uOUI{0(g-N4!l0FJfoKWr(NjtPO_A(Wws?x9JJ zbNnZdjT-f2|AKVyp)|cwkKH_hBFr}f5ITwiAsr_#M^9IGl&c#O;5#fP0ph>y}Pw31Wx-?(gmC=me~@!uGBDC8q6$KsX^$ zz{a;!Jcx1bi&?m$o;U%83;h=WKol_4(X@D)$sh$hwODUjTsC_cA}P<+COPh7(1%L@ zp~q!%M=a#SwDWPD&a%8ROA|G9Zsu)lc1PeR@;M*ZiMkPltJ?N`M47)%E8E4I4=MbT zhmFd@KQNx(n0{ENcY|OV^h`>~!^*?v04}q%RJj!)aGT|t%p%HCefgOmsY*%+X(Za$4?M)wYC1Rk*xp`mmvW5KF zFD%KUw)VQz60UPVCs*YN(0dTny6yD_TolhFlxyMOB?X`@yb_IaxxPL`OE*y+K$MdM zcjQvPrWW{`Wcs`!*?{vfX!xDd{CqtXpZU2p+0qTspH#Ep(P)C7*m8;S;4zAmD1G$YRP`HSq5nwz>>s8 z?Wx^O3UPjZ*cE_gT<`ILb=UXdO_R4K6J!I|RxL?r|Qt8S@IqTU1ok z2M*^wo8@bixKKYU%zfsnj$6~ZWs6hXS*6@lmn-_rlS|Ae@R>m1Je9~Lv zARbPX-G9U8xK}*A-Z1Grm4T%UY4fN}`Mz;rF^Qvf9`8E@JkFbCm+l(~A1dve`jVtJ zLjiG60s8U|_}8i8-r8yo%TC_;+v_gpRckXny@>NB>FBPE>kUD1BTYy{^_~MaRikn8 z2_OXTM;i+FnB=HKBY8wpTPKzpZUqq2u-l7x2Lgeh-Z?!rwZ#!FX=MPhu;3__yDhWW zw3%&20(cj5FY18KeN04sen9FPa{LA;`51KEpfva*b7e^QB-mZJN8sd1j#4o>IWw1@ zZ0;L@D^p(tuRe;}m>-$EFKhu*V;;sZl>E9t_5rj{Khld9hT)%d0?u|<}wJUKa zT>+k|zd4$%7Lc5j^xk9gvu@p0U=Dicl(>_Vlg)?w&nfcJ5fPka_bRl;Y7wh-_9t$= zT`0c~I?Vekj-NTQTt3H~@u%jcO}XEAR5eoVI&fZXspY_f@*}`Q=->+j&{v8}N)&?k zp5X;*q^Q$r4nv^bi+tkxac7qUV&CWHYFU;LTt+8aBX?^T-EUYxp=F2p&U2IzoU5ck zn*uiG?`Ug>(N$ys_okQWaB*;d+%`2eZ2=O{Z{%HyOH04a1_)*-B3Aq`;O>#b?^IHv zNuaNeV%>6jR(mv9jS)xBoVbe}T%!)ufZ8#JD4Jyc{%s~Ja3v= z2wIu5=sGn$T~t_T0NQE}>RyW&%g@afw=T1kv90}9kQExrzCROEQc@RXWFVkG_Olg3 zaM}JsVk0e92aC)Jy}fTMD=R|;HrPbTy1Krg%QOsv*h{_(oLN22RYh;#-ULlp+EV`v zDx~1Q_E?Rzvs#S7q!M5Rv|&>9laZ@<7cM0wCFaa^d=co-b-3E!e*3N3hcWtEE)E;) z@`$y!E9UT?E#xWRDX~iM=z5JuZ%&G^>N*hy-D43B!Mp3GvjG#~0_>(G7|c+qb(NO= z1)wdXaIX86?)C;_U~hL@!SQp9K^i-7Ts!LYXr)v1%F0S8nF|1xWiR5Y9_pHy#2!1R zjF!-kdkl84!3PDRjoCw@#C1No&-IGQI5gX7M;uKcA!mhX04Ctq0aaIbqu(1m`FV*t z0PvaXI1qAW|2~M}Wdlx2{C|LQFX^03N%viBN>@ar_XJM|WDbb~jVFkqCgM3mWp6k&9ENp+k``3RS%SZlb#;c5pOw7wo5-TkA<1MH^S;Ix%8h)nI z59H#J9othl0dFyOj;TTdg!C3=i$22ED_g78wpK2TMOFqZW)VGbb0qt*Nh1hN=+d69 ze*7+kr@m(qVOFo7Hue=#qBd%cMV7%wF9|6!p~#UH$Va$u#`WY;(x!iNbQb#0S1Xmb^K*gM-z=eNZ5mlsm$ zD)FkN?a}ymlgek9ijk{=)x_y?&frg~$Hp39By2mY!lA_NvVAEyDSqFoJX$ZQ)8By8 zis<+xwYyr?Lu(gsSW*iLtESrbfSdgqqoO0wVe_`VnZ|b8UTi#1O?Q@jfj4+S3$sRomn4X5k$C8^4c|OP9cGgzYcptL zN#6L-SnA!Eo41#Cq~3(Z=zb%QUGMEUH@3V2mujZ3*(o|ActKvSnX^dYfYb;%F z=xipA4q7wHOv)&>8>BctwIOP7dO(9Qzl;Y$|F7*ZSsv%H zJ(a*BMEyZy=YY$zWknU5H3|&+?_6}7mfUd0YCe6@tpU>DQ@$bJmHRPFURijoQsK#x z$vOHwdvqS2|5**A#*1>uKBl%JiAZ=zEk~7;V7M+e`jOdT+9!`WH(TY=vi|Uh9y^BY zy{oo43U;?4whcY1+sQNywIY$drAXzUu1(FjN6$NcP-Oh`7^4=rneOdZ>PkM<1Bzio z@BgqjE8h&At-0E|nI2T4kHhP6(Q^Vw2N)PQ-)@6Sv#4EJ> zy+y6B!{`s|hll5$jPz3!qzU~LH_Gnk$&OF=G;#KRyDrSnKiX~XJhM!EKB5<6(MLX@>|P}OIO8Mz@b3EjTGRcdy_Jpta?2P$xnj5(?_&u$ zb1r%!kYA^Kizgul1%=fW>J>4#2MeRQ(?a*8PMy%tYp(r-A+R=Vr$;4c8Gfv$fp-3w z(?$JFhd$j)Se3hK*q`kwW53BgZTd`VUL_+=cv~k&=#9|K-KO^YLIE^y?t*4_*xW~d z`KyuC_7L9&0!;<~%+O4A`Gq}m+BaF{$`aH=C|<;T=KIlDLqqOyX9Jg|cTL%vlp_&~ z<+nK~4(~*w8QX9hpIUqQr-)Y8$EJ0Le(I7s9V?qY?1 zF@>d}uN#dv8&4Dt1}p}@O_1Qo4^v1EUN+K48j})(`=|_~J_>$n#YZ^ z)i#rYeY`)`VH^AjUNB1yqW5cX2g2zY_yMmH%aW}Tr$qL163@rhNE+l0-5ccvv+4<% zB>j3tL&bs3w4ZywP2XF?<8Q^c|Dk>)_g*Lo=_Vs98;3dv_!Fem*4qYfZWB1nu7?Nd ze(=E)ERr=4BCNg7k)VgbOLGf!UJYvjs`x{$?MuAf|GqLMN7vSFNbjJohagWv#XcR% zELb?L(H@YqG4tnT;D@;s(?b2uaCHZds*NUxzhu8r0oRC>tz?0C|9q=XVp}_HwY{5>kzy3TV7DN2* zYtwQ?^;?HMm+C?k^#&L4{UpRiT>aCTu#dBmgz?YZb43+rmCvl+{Oymun_L6WP!HzA zLvD3w0wIchyH2g{pW(M(A@PolJ`DS^(3d@r_x)1Zm%`Y2&G=YxHZ<1nds*PlbFY=% zaLdh#vpdwU!$;WGNB=wv{D7cxUe?8a{C;xBmnm@hP1!0ThgN4wlM^|&vUN#0(?@GY zapt+#$!=;&$uK7KS%2DTypssl|ZtLG&W-h0L0kBBgf+_4u9Iq+Cy;*Uo~*U zZ`EQ7<0}zj)dMLNXSGhRwk&QP5WBV77hWO29=F*xtY+4d2#rsWkix9|h3Z^=bL z5$ue2`^rl9Z)l!uOz@pm;cpz&o1(>nXZhQpk4ng^}tb=QRX_`8yt_z;vldr zfzj4UylZY=7ozk|x@iEu@Z*Pvaovl!=Lnpo&lF#fulO z1?_BwtTr)eB`_E)aY{A78iy*9q<;Sxwjbz&1Rs=#R?J_W1K(&|E7z0A~@tzkmI<5A#PBCi0aeZiWw##JGyxJvIPuQ zOb*Ho zz*~kX;XR`f)M%QmTI5R!v;yfgX7;)pximTXPLBwdF;Jg6Lb z;(6mNX7+QeP{GQICy``jZEY<~)cJG;Hu$>&$SBLOWKXr(Agln;mc-FOBHP&6ouw+X z`%8#vM%&m*KskZ7WHNKUabe%nNRj`D8eBdfv@sR?;)OvP0A?j<+Anfc*+S<2UvowO zHKU}v`&3*=@yXwNBK5L$|0F$%$(!Ksq7U3urIu;5P{D2X5BW>#XiGeNpV3#^5^?@gGbp)5g%KlIPIPTV>WLgvGZiAzhh z7nfhA(IWl0`mbJdS+Mf=mjQUa=l0(pO_xvThW3e&_nJ5#9qYRisoiCT`Tf%NYPu)A z3xoMkI^P5TiXO|V$|>wGY3Q^wZpaTG2tQTGUG93_$(hrx+tCIZySEy)iyQT{PRp+4GP+*2f!Y3!0t84;?6}v|C9IVH2S&cm{ z%CuXA#zW5ZE|Uz4+U-P1@61yNvp_wMi@$@>M{#gwZY`aod+bR=Nvzz_)9CjF-9Mq1 zhpz>P<~*;@;?64U&*vdq=vi(nB;6kXS_FJu!iy^miOF-!XjZ&a@ZHutV-iu%GD00* z_jceyCXdEmv_!Qlxu5f5oa^OD5 zoUq0FOnBe-KKjsXv7Wj&_< z?A|dhEt&L{1pwz08aqp^21Edex`T3I1Czqg=4VR%3Md#jW`Zmm@Lj)uyxvO!s(pKB zOB~RV`}-y`Ha3>{JIf57ZJ;=qT{sB_P5*Td|Kmh4;P|p5UL^ikvbp^Ym|4De7ky;T z9dapX*=pAc64sME6=Ybcp=w$Cj*VZ9P^fROl3S2Q=6{;~*uu;D!il65Z*!h5k;4_Y zB|?x%Hy*Y{84$lem>}g0xLM8w>|h^z=36$cB+%Gpu8rq9>^R08{HsV$Z6#4VO`ZPk zr-T?kjH9>gVXg{%Zwe)Kp|-g4YJUm zms3;zY4gk$=rW@*4q0m+Ys2ghqCQt`V!rL7E1P~8)!TkUX|SB#DH#$O`ugc?o&j!W z1d<|LNIb$yE=aDW;>pV|Hv(0AC+pX3HSQu89&3z=*ksVLLFn;=-FsDt`iep%G$ z3v3th-`SisOIO|#M0yeLv51~Cl&d!dXc?#_M-N>J`#cz+NUiQm33TOD3hr3PQ&R`01FdNAzVBFNU(RH(vtI8R8j zev#Wqg!lfBrAORCgH|HSFejmOjEp`_!Tn}&WrWdPk=aPfJ7v=5XkXk0vxX6YS18F- z__!KI(RS!Mn}hMa6bIK@;6f3kOEg+%g(QvEjQ$ZGE@c>+3fJSvO2g0&XEhww4zGou0OBd+&&jPP$yUIi%@DP zkhN>hSBRfgX|Nl`Woap}QrSkW@8t2pj*X`f@*hvgT(lXkAaB3w@waze;tfJ5Ss#Fs zZmF9pL^PVHkl~ zuPV&q-R6mY#Bbm<7?}*JEDmxqzOGEo^KW;39b>0B4Ot`XXIv!dQzH>^$OdFDAA&u~ zZTXBit;9A$lAh)U`H8yj_sk$0HrU?@T6fbgeLf}V>=+W zaw8FB(QSzw;wy(8$mYTN)GPb5XR+bh61~l!`x|=J3^X^#xsf*sWfGTdR)f`1WfD&j z&8t`<4!xyK*)V%EUn7JY&UcFie%St-c2?vu8ZJ^C6fZ7;hn?M_AJr-)F8hnG((&ko zD44f>VQ|A#0Y>H7fSWlb&8#Ax08tdUxLPiwGZX+W{9>Rd=rs1d7O)bkDV3k+;ddIi zAF*)xf1298{6j)WQBhG3_o5E0qliP zOG_JGr#!3j^zu@H))p5V9XfWlH|n^=HJ|xmWXUX8cIsc6XiZ5<8jwM--$b`NMO{-= zge{Vr644J@Bfh|DXrIE5;5?^|+F&pw(lRixiIYe8a*>1u=h4%>2+e~)lZ>o38ssT5 zGBPCp^L-HQ$YTWX>Vn40**6w~I&h!VQoofk+H^){CvKehliM9I#Pp=6i2@2jn68@xl;eiI$X>mp2D11y{yy15qF9jvhDs+SLUCc~pOYKMEX|L2j~j>CQY{ z68r7jtyp0-n~{-`ubrJql35zTWXJ3cD#PWPtE=nRFJJoR`rfBxW|q#(IOq5bfW0SU zuNx&MCM7{T*>9G<9OF&M6dBrQBh5S0a>j|2s?ht1iOT-l;EQ&;2gs120yB{uCy+x5 z3^4)Gp*HWRY9VD*;bs148l5g>7{h^SV`F3UEY&MmcD(8|P$%3r9ll;%d@)PO zOOHQVS6W&c=ROe%%BQ?}BW*|cT-lnGV z3{^w@|J3Bjn2beEGkNZ1oQMdoSLF%8cU-SN*&$x0W uAqlKYy=g-Q5%41oz);sz2cvaA^gjSVa^H#o From 66fd52d4e8ca39fab68da1d6e870d0d3957722c8 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 29 Apr 2019 16:07:19 -0700 Subject: [PATCH 28/55] Add files via upload --- .../images/MTE_applicationconfirmation.png | Bin 7626 -> 7795 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/images/MTE_applicationconfirmation.png b/windows/security/threat-protection/windows-defender-atp/images/MTE_applicationconfirmation.png index ca8721db8b0714cf6d118f70c8d9318ed5ffad67..2c04ad2fc80f23a15f5e158584301e54d7e62333 100644 GIT binary patch literal 7795 zcmdUUeLR!<|Np8}O2tVxPD)Cm6qTaP%}$X}A@_|@xyjv(*(?((2?3BFjiMC z$PN9Xy6d3&?TmF+|ClbgV$NYPeke4gl-OwrOj|I(WbPB@h4v4@_@ja$+czCJ2<-AQ zyBR7Z0_}gx4+E)C?1TcV!ar8D&kfnq{TP3w4@6(AxCxxuBs=4P^2Ok8pnV{S5UFhW z=6^2kALbQw11v>D$nW2!0`o?h+2sa0*gyCdCajah^ncT`8mhie@t;r{0>g2w#-ToO$2YsJld~k zxG^$rt;e$7Eq&JbqfaSuP8vaW2WBkx+H18E6a|l5ADFox+)jP-=&r-YJzI7ee)+hc zw0=!_-Hw~pHSCW8&!2pJo5WD6)qHR`E+RM5_cXpL&!l5Pyv`TtKbmzbH)4@tT)>>` z`trr~5(M(*n;Z+V2J(LDTnPkHv6!~l^6}&S_|YI;v4!j4n<0=XUc{K{ z;s?d({jlXh#X?8zC^2R6^2kU>Cd=Ls@}41@88lll;(9_Lfg5*1?&?2~hrCxgzaDaZ zYyMiun}>F5Ag*SzTO4qNK>B~x{*PM5u#2I@fxvxss#liQ8IP|#Bofm&P5V+Jts>>j^)!ZV}qWy~`3f~(uM`JYyy zOE^wD<=1bDJMY}_X-ZrmAl~)&@-ma|OSU+a-e!4rFTGg>;h~|FHZsI`ryoqXe!{OXs)}9l`0-;)XwI%}X&5LW zMs7*p5vNUV`}woBPk?0witvcNEwZbwz^maIzwZz6YTORFd`8c)Ggxo#xhHmANnVga zIo|v<1{Im*FP)u>aGf0#RokXiNA*F74!0HN)Ny+ArIQT`KVn^+|{vHlD zAY2DeW%f}-0cX<5CY?)VD<`uVOVgx6dn;U9nb=6D*e!}CNvkss%PHt7dDh``WLFZN zlZ6Ocd6!j&I<2BQ?)pLJlz~CNJ*?3?I+~6R3HgRcMnu%mhr#$S^YT!Ugx=+jjt=4kE<79#u1+BaP-0`(xkz4$ zXhGb}%uKg7Z~F!^ozBB@>pM;NiG~vqj5Y4)UwoT z7J6BIf*9}waQZb*eGv0QuN2c5I({wJw1KN(7Mn* zZFV*kK~g^Mk6JX}Mmrx(w;5fkHSZtl7DVdIUc3jqspT1uM? zq0mX!?v_+F0Y8%AshjD8#X2=8CpBsOwxzwl|9N>-c{# zYhE&gzIpTfqo!90?hoRj2g=@T`eiNH?ZCc)NLc8Qi!du|ciY(9Q=8&K`_k60U;hZq zsrNBgPfHQa=e{svkk)>wAeFl7UaE5sE-z+KaPS(nFhhw%LPRfrJpAj%*2TpL{s?aK z=_ab~D1CyAxKdD15XEZ3;PC^M!63(fEG`$ePZcw!`3-!7D+N8j`B4XbsiFCwlf}A? zoMIjbbs8vrc2LcfwnG#}Qzf~5MIt`5D@n8^Gvw^Cd%yoKA9w$#vG1*0g|5fihlgJa z9%!RO*Xn0-3E%ISl1T3vRJoQ=_q^A89E%qjV`kA>iP7uCdRXE7)yZI&j{%0v0H=k8 z1&#DJOb&@1G)ZkM4>+x&l-eSTEuV&s)KphTM@RGYOI|X3JoWW*n4EB``wCt!=&YKO@m6ftc!%ibls}MPoo}Q~wKF=Ax2t}8b zvndB7BO{43c8CMuTkqt_e9yd`oD6i`S8*ewuFmkq7uQ^-i5S*mSc}D7|>fkIQ^ZQ=^aHGA!Ht`TNVwzpOEIC64A&A`z{Tv|m|{asI87Q0K5|L+n#a4a^y*{lA8&{vP`UV4mG!jS=*<8Z!A% zUbi5&FZ7Rlrc{`zsqP4xy>nmLALzR8c+>4$HUMW4;i7GLMt0bnjxz_5^&f ziRMZD#+|e?UfY+tm+smAlWu(Hr=2u9kkSBwO*;5P=xPt-gAa-FHe`eJP`d-UE(iGk z?$Lb7X2^{5|38j@sOt!rYlnQCfM}6@KL3Or4IBa*3+(9ft#WRsw5cRNd~p5%%eER$ zn+~{P`P%-7RiQl#k!*w-Ki||b+Qu&OJKer%D$?=r4vl@O9g~w~eF6F_RkgKepD7HhbN&YNggoY22e5u=m{ z@|6ZoK`(ur8{bJOT@Zu^&kE=UsYy1R;UbkuyHaMr-)B?2^>%|FNUaPu`x?OhB_WUx z+qOl_{vDU#9^{AB)6TGd+C7FqXf@sJ!LGIUVFu{4dA#QU7i#Xse)tpkA3!tZXi+-w z;pWYoDaK(Dap%uXiYUaSp|er2GeApGuJqOOVn4XMpxCpwzv@dzM}50}!jF>NqDDtY zhkyQbwRI!05S$7C<(-|ESw5iP+lGg|Tf`SFEQY^-uNZ^=BqRYBYA2e1tj+@*Wd*1! z(R`jls;IEkOz*+j0!&LuO%>e%FiuegNpwtCcQVQsVC61lWkd(}>(^&+f+m$prAwl< zGtkUHZ|_g!Rlo;tX*5Fd+;j^-3t{G9h$|_Tt(imFLCxTnMgtTju9%t6FMJQ*yT#r^ z%gxP=E*RnNtA=0su~?7V&D*S;ChXD~45=lBT{_M~qSLoxOXijSK}4E^aB9j5Y)z{Y zXgb;zzs!3MR;9) zk-2)$tO-`#PIB+12ja~z+7Ph*(y%uXxBu5C?z+WN4>jFD9zGbs5lt%g{h#f zo~j0$hRc{;-nJ^G2m_s>K!9&1y$_>9(K`QD4W0m<8XFt$bxb=p06H*)!EiJpPw+1n zjp7*$#>9^Wu^7QIdo2k)0oVYL$r5VrW=S4!(x^e*L^OuGv$m|Q&8pN<8!);z2IC0! zJfDFBWyoYYnIHj-Gxlu!Wq5wxQECE(4mi{6<`gDZS0o6&*rRlzgSv0B+PA7y@wV`E zfJt|Echr~~Cd-$KEl-8o0V%&%RaK^{f!ZEV#}o(a^a8=rlKw|)Q_kh$@^Bcf=28_q zNT8BruD&D&VrKD<2jB@r@6Rb%5xVXeUr^0Z3E&C0_mL+?y33o(1$YmC!ze0$M8Ox~vWMo>6~aDp}P zIi5BR50>RgrlDp$Gg&bsF>wOlE{r11fM@LcoKC__vvU0s z-0Rocl~hegJpvj%^)!&kT0m$byN5d)7*QdsO4s1x_GlS)^3Zh*h!sNLV9<4M$LRys3QC8()$KSc-~@h_PgkvF9K*pj?QG zTM(l2!7sM1xl}$hXaj|=#U3JUPv-rgmlw;mhx*1@WK z_r8M@oCTmc0X;c)fX(iidl^H96Z+@pF@aH0G@yduMn*;iZ@me;5Ui3NgEpM#Bm1WU zxEg4!@zK>=s#4m#KUW(I^+w0W5OX9Fi7fje%+z(|zKzr(9JA#zYdak6@GM>)s%L4iU80}lGutrmTxUKS>UG+9Zf6USt& zwO;-54AV*ks^EP%a&(QO~z2OdkWbjAi63y8k?P$ z$Lf92P>#>WHqM+3^B$je>?GwFwDdSrk|nz6lg{^W%c5Yj9_`VR2LWtA{{V;rAE(dG z&eG++%5ETgS6&H!i(f@bCRL~i-MjoKVR(M z^v-W~E8i81EH%`DSdy_63e}BWE3V0dv(8=2+%aLiuRcM#%0o(NF;cqVeDGguNudK)NLT%=?qpDfa<@il-V zr#V*G6!~>NvQsp9-kD3{ovY+EOLbxqX3UkHNlh{Vs;k&QObH&MC%Mm4%WX4DCM1Sy zM$v{Vo0P%S(hBI6+r~uO+i8}curESd2(T4GNM-YV|w*!ueqk8>y@}uyTqc)&cno##E=l3aP zmkG^g5#_3kfCkOP%8+k_{r`bO^8d&=zpPDwKzhmi=t!Ttr`JBuTk>gsQ6YBa^u+;kLuar9+iMA$5d z_4H%ebl)5d_Mci84!6KoD-#lyht#CCT>)I}2l97~21NoE$hYA}McA`q+q`y(upx%) zM9BbhB}8j^3Kf%n2E}VtTb+r&x7G)Vywcp#GQy)p{`erLHcr$7gQGnD$}|qi^;1`m zSrK@O?hFkL{rJv4RW3MH0bbGIKEkAnw%fKXGD*=)v9V|LVj-9=EY9}=4N%%TmKURY z^ypEj@mqF$Zn>OUz5ZEy2 z1k}OYJJ&cuT`gw0(m3LWdGun3XM1z=!`x|4=~CvhgfD%b3R`tu{n-M0l+fzp8Fff4 zYCbJjC~lC_5)zD~mgeF8BNFoxNUg)tiZ=^P!GUAG--3nFR@=1lTC>lf%*{12JFLKP z`(o<8I!bLWEJn9G560r&1W&k&b-fmBX8HlR8B1OLN0YK=tAIs{w2{u`N!`r{V7nLo zZrU6nq>0VVhl^n=rQn8+K-`XK!4?yZ@$;7E=B7*I2P0;_-J9O!04q}<@6KQQ&E_^Z z2EAIu>T=zkA8lG7phYpJlJ8YD6Z{xyRK)yv+VaTpn6&C@{l(F2ls5=m#RS!x{3b5M@{XweCxXXV>t0~a&nu@ zDFCOv#9MF0Q* literal 7626 zcmdscc|4Ts-~UvnoFq<*%2KkFiuh*VeMJ$X5Lt%o>loWuh8d@vLP8RfBuBCgGo&$? z8PiF&ki?i6Go!}X24fpyEYIbf*YoG|yk5V5e$Vs!{b9L3_jTR(b$yoi`~A7@)EhSD z2ZbetArQ#HYZhj95Xi1f@c;U+`@nDK-CeTa&;BqA=ST=d^yALYt{f#%DPRL_w;=y7hon^lxi~ujkIt(@}viUx?)8{+W-6@b-o9x0AU4Im{Fe zgZYL=K~}nRDZsXGXP84^RERI6eD13v1R|Yt&CJ9h_Qfp2I6!`CvweYgW-4@lp3ZY1X6YA6a*6dhY;kwt1l8=s$F{Q zFXZeSR6LxzoI?xI;y11mGu8ejz%d$}$S~v7G)<8v0uF$4E zCNUmbYIjX8s{@~#N}Lj6W8bf=)NdJ{%Cu6+%MQ@cYmK@i6ym5mt==R9L>z$4pnWP z{8ep5Ka=Pa6l6I(ThGNu6E9}4J32d4(bYpCmgkN(;br$j2xkqt=PoWeLK)4Nq68xx z%O2{UG_F|@p_czBCB*@A%c-#>DqG?3{;6nUQ^B=OB8fC3oWo{&hfDj9>ODh@uvk0m zqP2{ndX(kMt&~q?a{2a*(=Fpp3<r#*%Z&D; zeLDwxGcA?bUY#L6vWqO`6Bt+#6B|2;gu!6d+S=M>9xOVY+tbrCwMwY3N0yb9t-~XS zJ(u3}PcfOymoIHM(MaTQK|w)3=hUfF(`xl#kgKcf9@<~Zk#IN;%z4x0#L4d$ajowZ zG!401Sy^F``P^CjyLSVwE-usYurC|I!NJ(6)s>Z+odnPM>JQC5a1Eb0l-3$`JQMly z6&4MG&2_%V*7-UcZT{RT)lBY57iU>eX>iL%L-J%}TA-ibRpW^O4M{ak%~CFZV=eMf z0d)KKV^S z%~~-2c}PgefA^Rv;e!uRh58%np=A}2%Y3uNjx!gQ32Z5xTm1dS4Th zFUvYfU@#aIv=}X!{$MOZm&|+6;z^dSBTY>O>gwxDxx7qyG~!p`V5u78>G>DFxq;ZW z^*-U~kt0V?I0O+&ZfRqO(?s>v)zueCtzLbIMaK&{4;8Yn9cnbtxr$2BF*Ll$iEuVk zF}+;))1my2%d-3LUq*@bl8eF?FsmCIq@!t9I{oUt259(%hxg%am}*|N-`*pUw(pb1 zolJrUX$~0bYex*9x}?W73K&9nbAaa>J}n$5ym3z9`0?ZNc``@c9>zesQT=e@^RtSI z=Ge5UnVFC~j7n{j9DU0I1|^XKe{NIejc0@jMjp=p`hy%izY-^w-Nkv`7XV;} zM+|Z(@=I-JM{IAQ01%j(DoCb-vVCG#F(#aP|Nh?dd0lGi>TJF6hi)&=_4o?q0MOuz z z@h}u)GSGPiv8&=pcJ=HmERaB7|L$AXAI`|NwXvC2s!lNCAv>np!==Fsv5#*+Pw@d`;=#GYlhI3plS4~&9!gf5>?DFvJN{;c8j7Fl4^s)AE9~25oajbSM z?VsuZQF+?M$=a5A2xCy+l4b6l@YSv4ewnd5uoJrSTZG&WPBfjtpz;bRnIC4xk2V_I zjJIv}iwC;{j>76|!d-#uo6`;&r=_J~i3jjvMMXtKqZh@)tx;(7oa^{G*fBHIZ(~|p z#%DxgFg$|~-)mmmooA4b3g34VdYHbsi2{`cmi^kU!lL%}fKUlr$FT@i^!)h~m+Eoh z{kLqY9U~2m_b0aiPxi%V>P)I{OpCUWB95=UDd;h{>u@0_izs?;oW*1g7Bw7d4DsiW z$mexUtvK;!c{~qS27y4}M;~e=*-J;?t*NOw-RbicL6ePWOsAIJJ6czG;Qqa>kB>Vz z(43xD3k}Jf+sbbyVx-G>SlJxQ&QG5nii-2LgY9Ivjxc}>SBF;zG{&25T@VL}gI!sQ z_Ek|;wNlHUiN}_T1gn!8nbUkEIoxS?gH5Gi@=f6wXLJ49`fJ@9#TIo zx4v3QoyK3(FY5KMawa&J^=DZq{8$gvDqv%eg{A=d&bRg(p~lLCsq;;rv*!^H+u1J~ znoU7+Kk0l8P|X5E{c5bFq@=y*#nu}cKyAMnW-@bUXJ^Bm*y&O7Eqf-T^z2mfNV{?tK5qb_(9~qm ztu(kpY~2F_Kc|~o1vw#F7@|!R0}D#Z0S;hs^vxtu_Flni{1$+-5MYNI4NmQxU~6)?_sR??_sySYM<=@xWzWL$;AmT zR=z4!oy=Mj$IjYRw8_LVN~r%*!-;p-L$jrh zpQ?7Wl5Wp(Q&FsT#PG&yLFNLO-$o@QDF3Zmj%RfpthCXi2Hkqt`X{EV#7%{0qfuGq zh&hvEc_j$%!g?T*-10RDuW(d&O692u7^JMK%3bW{+755NjSLQKpi`NoHI6NW=jtxK23u_nPUSgV;0)V7?|I`>=bQ?Nk3pl+&VWKB76XB#sHli+?(DqA5G}MZ zcXV`IHma+wl?8c$<;=~@fFyYWaDas}&hBiO*1UA-yX!UxLWRQxq#h6LhM_K_CDO0* z*Pp@E%9Z|AK4Zdnb#@M)m67|C;QuB3jy>}K13QIFFb^Eff`7i)7ZCM2 zvg=<=SOgs;(}}avqG@a$Ya&<+@YbN;x39!g+tJ2{Pgcmg1gV%q0f#A@2#K)ttEswRLsR1IonGsPQK4cdy4KJ>%jV8p^x$b#%gDVp*f? zJ7}~!;GZozX;OkSqV}lqdT5EvBjRqSOX}+K=~qoJ7eBVPvH3JJQ`P(=6o_L$V`T^L zU&h9n7C(MbSU5!iAr*Ymj~J*1GaL?=mhwxq`FX&}>%|QO@<2}As@ay_gTlukK|gw3 za`x~Ld-0ig-LAr6^w#3JfyIHyJroWm)C}RI@u}S@8L|DyW#!d+#gRnN83D#`GCiOt zinU|jI!L?$gv3+Oy?_G5rtQyKC~|F^ZHso@3v)pDy5eZQo}MOVDz+A_UN=Dn^P>PS zqfpOVy}|<$;~#q}LL=iqEQ0XQu_bzI-|QIwW+s0rar+CiMn;V$ts`+5qv_nlhzL87 z^gxXQSr`ecGZ8y;rFm-6>TEW4RlhI;NWN>Oc1UL+1hM`)p!OWO*%k`xgY8dyCjk6h zE57l#uCA`x-*22XZlq&uoLFjmKVQ(iCjDb;Q_$>GUztD^|27r1n`nA#b>>_z{Xvdl zIeMH6_5-9gKlty2ttZhjxPP595MWKvq?d4!A5a*^mKLmmOv_#4NLmUf!21~ zOhy>St!|c-$kVod#1MS)hpHn(jV0Db@1nlmi7xp3}QTaJhIA@{bGt>LbTvLdyidRx_Vy-GKw4lQX^w;h&vU7*)U<>n^=lN6&QxR z@IN#q5Dw$L-E51|B3|BT%U>Z5JFsp~Ylqf1LA6<8>%*aujP5|3n%~lCv`6Nt%ytxg z9nqA0Rl;-_?lzfVqzdX~cs814^sfNu#_*stj)^z8Mk2$BdPJf{|a zH3`~{N~Urw)4)w=cGfIfDS)OFj%C8CFd$5TO19YKbx#K2%Z znu#|AAu!lf;4N1XmwKcJzR+dcq)Uy~g$toZPa9I!NH9;yQX^))dYRY-x-u&yn5U&h zkATB_HDP*%(K)#3T0FjV0;n>q8fjx%CnWLL=U@auOKG}z@#0iqH|rL;r|J86?<}s@cAj*D{fHetkih4g9*E&zFD|?ny{@t(X5UY~AT8$h3Hqz2oR4DNuU%=g*e4x1U}vK5cGp{;|L9UN5w1=8sQWc|Z;F4bA0pFI_e0VQO` zxKsA%6!q>12CVHDYLg6wm;xN7l&%1}dLMs(b6P8@viaew@2D2Q1eawi95E5m(Px1o z9-o-t{QP-41K@IrhWl|iO1iy|TZwj$sR|Mo0fH1He^etAH!LbV4_02`Fl||M;w?jF z;J4=K&mT$mw0TF(n)jz;UIu{H44kxe{`m1Hwd^Aa<{R0)cGHwyxvTy}@c6h?d~Eq1 z*Vzp;+d?S)fQno*`*7x4fT*?2Z$Zl(MTF+(=l9_R2kmty6<$~jPO8J`%aSx8!1BUxKpix^~$`bqhUOlkKO z469^Wn0Y9J>v)1V)2-x@?B*Nf5qhb^g@soe$0T-)()HdJlvHpW`i?%EMRe!w#(R)# zR#lqgwVUa}kg%mMu)Y8PoOS|^ac?jgT zya5C<_^TM?cg+v~y=f#))t&U%)@aR)8P79pjN!c;A;#DmZEr*#Iy5vg@-%*RuG7f_ zr8(}xR7oI+|E@m^Ixo;zr=<9(NvwSrOFSnhxBau-xXroRHFF*k=1)#ovjg`@+gpOg zvCboLtBja-XsLcus1hV*khQg<9mk)}+1Og85QH;&damb#)1sYs#Pi5y#0E1Jo)20; zXRRO-Q&TqhxJ2sG_3PI=`^#)`2vq3d4}0Dh^1+7}dowfiT9-$LLGMISqRLu=yV2H9 zZ_oiQPL&mXT3>GxO$DN$_oZPrklLUj>Rnx)vfq)t%|+WA6N~fTP2(1RwDPe72Tfuj z@3-UE7E7yeI4ixv-1bbFu4EbXxl9@3T#t<($KR64)nx)2W$Vl~STUzX%=oGC#&{7_cW#+V|OX1qQrzq9L< z6womOT-aHG6K$Z*zjth?&c8`NI4EdZk~TUnYXBK>rmRzOW@ck`y++x2sve?+TV=+Z z6)DS!hq-G@6N{hqc_}F!nTZ?Taf@TAFJ8Rp$V4y8$NiiyPDx3a|4V3b^shaP!cw%u z$vMfty#=lTr!3A4sjp3zWcox#+HWT;b}FL!DS|oT&O(46x8%U#|031NqjP-xO~M){ zZ^w@hJA6+YqShTiS7;DB|LP4URNLaW(wiI`$Q6wkRc2wmc7XMV`DI zvN?tsXO3PfU?tEo+FEcRshAB)yGDCf_%x49qA=kr9ZoT<_wD~b#FPcT0?@l7asQV- cxNQqfq0a;lXb4ikCrik+D>i1>%XjYm2g_ajZU6uP From 2869d6549f5daccfd0bc3b8aa578654cc4ce1f51 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 29 Apr 2019 21:41:39 -0700 Subject: [PATCH 29/55] Update configure-microsoft-threat-experts.md --- .../windows-defender-atp/configure-microsoft-threat-experts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md index 8910997f1e..bf93fe7524 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md @@ -42,7 +42,7 @@ If you're already a Windows Defender ATP customer, you can apply through the Win 3. Enter your name and email address so that Microsoft can get back to you on your application. ![Image of Microsoft Threat Experts application](images/MTE_apply.png) -4. Read the privacy statement, then click **Submit** when you're done. You will receive a welcome email once your application is approved. +4. Read the privacy statement, then click **Submit** when you're done. You will receive a welcome email once your application is approved. ![Image of Microsoft Threat Experts application confirmation](images/MTE_applicationconfirmation.png) 6. From the navigation pane, go to **Settings** > **General** > **Advanced features** to turn the **Threat Experts** toggle on. Click **Save preferences**. From 91df670dbb77c98e3ca175de928ab3059b15be7c Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Mon, 29 Apr 2019 21:59:10 -0700 Subject: [PATCH 30/55] Update configure-microsoft-threat-experts.md Spelled out WDATP --- .../windows-defender-atp/configure-microsoft-threat-experts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md index bf93fe7524..04731316ec 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-microsoft-threat-experts.md @@ -117,7 +117,7 @@ You can partner with Microsoft Threat Experts who can be engaged directly from w **Threat intelligence details** - This morning, we detected a phishing email that delivered a malicious Word document to a user. This caused a series of suspicious events which triggered multiple Windows Defender alerts for [malware name] malware. Do you have any information on this malware? If yes, can you please send me a link? -- I recently saw a [social media reference e.g. Twitter or blog] post about a threat that is targeting my industry. Can you help me understand what protection WDATP provides against this threat actor? +- I recently saw a [social media reference e.g. Twitter or blog] post about a threat that is targeting my industry. Can you help me understand what protection Windows Defender ATP provides against this threat actor? **Microsoft Threat Experts’ alert communications** - Can your incident response team help us address the targeted attack notification that we got? From d29584a74782371199fed5437b6b262c9894ce5e Mon Sep 17 00:00:00 2001 From: Jose Ortega Date: Tue, 30 Apr 2019 20:03:20 -0500 Subject: [PATCH 31/55] Solving Issue #3055 --- ...xtension-file-exclusions-windows-defender-antivirus.md | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index 492af0b7b7..52adc53122 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -20,6 +20,10 @@ ms.date: 12/10/2018 - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) +>[!IMPORTANT] +> [Windows Defender ATP](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection) does not adhere to the Windows Defender Antivirus Exclusions settings. In other words, Windows Defender Exclusions,however they are created, are not used by ATP. + + You can exclude certain files from Windows Defender Antivirus scans by modifying exclusion lists. Generally, you shouldn't need to apply exclusions. Windows Defender Antivirus includes a number of automatic exclusions based on known operating system behaviors and typical management files, such as those used in enterprise management, database management, and other enterprise scenarios and situations. @@ -46,9 +50,7 @@ This means the exclusion lists have the following characteristics: >[!IMPORTANT] >The use of wildcards such as the asterisk (\*) will alter how the exclusion rules are interpreted. See the [Use wildcards in the file name and folder path or extension exclusion lists](#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists) section for important information about how wildcards work. -> >You cannot exclude mapped network drives. You must specify the actual network path. -> >Folders that are reparse points that are created after the Windows Defender Antivirus service starts and that have been added to the exclusion list will not be included. You must restart the service (by restarting Windows) for new reparse points to be recognized as a valid exclusion target. To exclude files opened by a specific process, see [Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-windows-defender-antivirus.md). @@ -57,13 +59,13 @@ The exclusions apply to [scheduled scans](scheduled-catch-up-scans-windows-defen >[!IMPORTANT] >Exclusion list changes made with Group Policy **will show** in the lists in the [Windows Security app](windows-defender-security-center-antivirus.md#exclusions). -> >Changes made in the Windows Security app **will not show** in the Group Policy lists. By default, local changes made to the lists (by users with administrator privileges, including changes made with PowerShell and WMI) will be merged with the lists as defined (and deployed) by Group Policy, Configuration Manager, or Intune. The Group Policy lists will take precedence in case of conflicts. You can [configure how locally and globally defined exclusions lists are merged](configure-local-policy-overrides-windows-defender-antivirus.md#merge-lists) to allow local changes to override managed deployment settings. + ## Configure the list of exclusions based on folder name or file extension **Use Intune to configure file name, folder, or file extension exclusions:** From 6628fa53dbbe6fe9fefb1b9b345ae00f4999db3e Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 30 Apr 2019 22:39:56 -0700 Subject: [PATCH 32/55] Update advanced-features-windows-defender-advanced-threat-protection.md Updated based on customer feedback --- ...d-features-windows-defender-advanced-threat-protection.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index dff8fdeb1c..ca5f1d1fcb 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -91,11 +91,10 @@ When you enable this feature, you'll be able to incorporate data from Office 365 To receive contextual machine integration in Office 365 Threat Intelligence, you'll need to enable the Windows Defender ATP settings in the Security & Compliance dashboard. For more information, see [Office 365 Threat Intelligence overview](https://support.office.com/en-us/article/Office-365-Threat-Intelligence-overview-32405DA5-BEE1-4A4B-82E5-8399DF94C512). ## Microsoft Threat Experts -This feature is currently on public preview. When you enable this feature, you'll receive targeted attack notifications from Microsoft Threat Experts through your Windows Defender ATP portal's alerts dashboard and via email if you configure it. +Out of the two Microsoft Threat Expert components, targeted attack notification is generally available, while experts-on-demand capability is still in preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. You can receive targeted attack notifications from Microsoft Threat Experts through your Windows Defender ATP portal's alerts dashboard and via email if you configure it. >[!NOTE] ->This feature will be available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) on machines running Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441)), Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464)), Windows 10, version 1809 (OS Build 17763.379 with [KB4489899](https://support.microsoft.com/help/4489899)) or later Windows 10 versions. - +>This capability is available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) ## Microsoft Cloud App Security Enabling this setting forwards Windows Defender ATP signals to Microsoft Cloud App Security to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Cloud App Security data. From 40f0bbd59e9ec7d7e3a69a264bd0776ae7e70495 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Tue, 30 Apr 2019 22:44:16 -0700 Subject: [PATCH 33/55] Update advanced-features-windows-defender-advanced-threat-protection.md --- ...nced-features-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index ca5f1d1fcb..1a5889fe4f 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -91,7 +91,7 @@ When you enable this feature, you'll be able to incorporate data from Office 365 To receive contextual machine integration in Office 365 Threat Intelligence, you'll need to enable the Windows Defender ATP settings in the Security & Compliance dashboard. For more information, see [Office 365 Threat Intelligence overview](https://support.office.com/en-us/article/Office-365-Threat-Intelligence-overview-32405DA5-BEE1-4A4B-82E5-8399DF94C512). ## Microsoft Threat Experts -Out of the two Microsoft Threat Expert components, targeted attack notification is generally available, while experts-on-demand capability is still in preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. You can receive targeted attack notifications from Microsoft Threat Experts through your Windows Defender ATP portal's alerts dashboard and via email if you configure it. +Out of the two Microsoft Threat Expert components, targeted attack notification is on general availability, while experts-on-demand capability is still in preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. You can receive targeted attack notifications from Microsoft Threat Experts through your Windows Defender ATP portal's alerts dashboard and via email if you configure it. >[!NOTE] >This capability is available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) From d168459622bf3c0119a2d623bddccf50cc506ec9 Mon Sep 17 00:00:00 2001 From: Reece Peacock <49645174+Reeced40@users.noreply.github.com> Date: Wed, 1 May 2019 11:47:51 +0200 Subject: [PATCH 34/55] Update use-upgrade-readiness-to-manage-windows-upgrades.md Added important note. --- .../use-upgrade-readiness-to-manage-windows-upgrades.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md index 5b149323f8..257580ff5a 100644 --- a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md +++ b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md @@ -12,6 +12,9 @@ ms.topic: article # Use Upgrade Readiness to manage Windows upgrades +>[!IMPORTANT] +>**The OMS portal has been deprecated; you should start using the [Azure portal](https://portal.azure.com) instead as soon as possible.** Many experiences are the same in the two portals, but there are some key differences. See [Windows Analytics in the Azure Portal](../update/windows-analytics-azure-portal.md) for steps to use Windows Analytics in the Azure portal. For much more information about the transition from OMS to Azure, see [OMS portal moving to Azure](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-portal-transition). + You can use Upgrade Readiness to prioritize and work through application and driver issues, assign and track issue resolution status, and identify computers that are ready to upgrade. Upgrade Readiness enables you to deploy Windows with confidence, knowing that you’ve addressed potential blocking issues. - Based on diagnostic data from user computers, Upgrade Readiness identifies application and driver compatibility issues that may block Windows upgrades, allowing you to make data-driven decisions about your organization’s upgrade readiness. From 96c1cb6e993f0ef8112377976d9a4d7c5ecf9e77 Mon Sep 17 00:00:00 2001 From: Reece Peacock <49645174+Reeced40@users.noreply.github.com> Date: Wed, 1 May 2019 12:14:06 +0200 Subject: [PATCH 35/55] Update use-upgrade-readiness-to-manage-windows-upgrades.md Added link to updated article. --- .../upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md index 257580ff5a..7758956656 100644 --- a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md +++ b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md @@ -13,7 +13,7 @@ ms.topic: article # Use Upgrade Readiness to manage Windows upgrades >[!IMPORTANT] ->**The OMS portal has been deprecated; you should start using the [Azure portal](https://portal.azure.com) instead as soon as possible.** Many experiences are the same in the two portals, but there are some key differences. See [Windows Analytics in the Azure Portal](../update/windows-analytics-azure-portal.md) for steps to use Windows Analytics in the Azure portal. For much more information about the transition from OMS to Azure, see [OMS portal moving to Azure](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-portal-transition). +>**The OMS portal has been deprecated; you should start using the [Azure portal](https://portal.azure.com) instead as soon as possible.** Many experiences are the same in the two portals, but there are some key differences. See [Windows Analytics in the Azure Portal](../update/windows-analytics-azure-portal.md) for steps to use Windows Analytics in the Azure portal. For much more information about the transition from OMS to Azure, see [OMS portal moving to Azure](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-portal-transition). [Get started with Upgrade Readiness](https://docs.microsoft.com/windows/deployment/upgrade/upgrade-readiness-get-started) You can use Upgrade Readiness to prioritize and work through application and driver issues, assign and track issue resolution status, and identify computers that are ready to upgrade. Upgrade Readiness enables you to deploy Windows with confidence, knowing that you’ve addressed potential blocking issues. From 95053d19546fa083f8870336ca940e30910b4f01 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Wed, 1 May 2019 11:24:52 -0500 Subject: [PATCH 36/55] Update windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md Nenonix suggestion 1 Co-Authored-By: j0rt3g4 --- ...gure-extension-file-exclusions-windows-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index 52adc53122..493247b756 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -20,7 +20,7 @@ ms.date: 12/10/2018 - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ->[!IMPORTANT] +> [!IMPORTANT] > [Windows Defender ATP](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection) does not adhere to the Windows Defender Antivirus Exclusions settings. In other words, Windows Defender Exclusions,however they are created, are not used by ATP. From ee6b88e60ca1da6944b555264933283a35cba453 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Wed, 1 May 2019 11:25:05 -0500 Subject: [PATCH 37/55] Update windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md Nenonix suggestion #2 Co-Authored-By: j0rt3g4 --- ...gure-extension-file-exclusions-windows-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index 493247b756..f29bb4bd78 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -21,7 +21,7 @@ ms.date: 12/10/2018 - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) > [!IMPORTANT] -> [Windows Defender ATP](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection) does not adhere to the Windows Defender Antivirus Exclusions settings. In other words, Windows Defender Exclusions,however they are created, are not used by ATP. +> [Windows Defender Advanced Threat Protection ](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection) does not adhere to Windows Defender Antivirus exclusion settings. This means that any Windows Defender exclusions, no matter how you created them, are not applied by Windows Defender ATP. You can exclude certain files from Windows Defender Antivirus scans by modifying exclusion lists. From d94154c14a160a37d6b1d670cdb9f9cb5b88518a Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Wed, 1 May 2019 11:25:24 -0500 Subject: [PATCH 38/55] Update windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md Nenonix suggestion #3 Co-Authored-By: j0rt3g4 --- ...igure-extension-file-exclusions-windows-defender-antivirus.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index f29bb4bd78..4e0ee50bfd 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -23,7 +23,6 @@ ms.date: 12/10/2018 > [!IMPORTANT] > [Windows Defender Advanced Threat Protection ](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection) does not adhere to Windows Defender Antivirus exclusion settings. This means that any Windows Defender exclusions, no matter how you created them, are not applied by Windows Defender ATP. - You can exclude certain files from Windows Defender Antivirus scans by modifying exclusion lists. Generally, you shouldn't need to apply exclusions. Windows Defender Antivirus includes a number of automatic exclusions based on known operating system behaviors and typical management files, such as those used in enterprise management, database management, and other enterprise scenarios and situations. From ae4e3f030b3929ef801e9478c85f25d610924bb0 Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Wed, 1 May 2019 11:25:46 -0500 Subject: [PATCH 39/55] Update windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md Nenonix suggestion #4 Co-Authored-By: j0rt3g4 --- ...igure-extension-file-exclusions-windows-defender-antivirus.md | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index 4e0ee50bfd..e2bdef688e 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -64,7 +64,6 @@ By default, local changes made to the lists (by users with administrator privile You can [configure how locally and globally defined exclusions lists are merged](configure-local-policy-overrides-windows-defender-antivirus.md#merge-lists) to allow local changes to override managed deployment settings. - ## Configure the list of exclusions based on folder name or file extension **Use Intune to configure file name, folder, or file extension exclusions:** From 5b2c2255ca10709f714ac3ec4557e6c93fd90f2d Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Wed, 1 May 2019 14:04:08 -0500 Subject: [PATCH 40/55] Ading lines --- ...ure-extension-file-exclusions-windows-defender-antivirus.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index e2bdef688e..fb528fe1b5 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -47,8 +47,10 @@ This means the exclusion lists have the following characteristics: - Folder exclusions will apply to all files and folders under that folder, unless the subfolder is a reparse point. Reparse point subfolders must be excluded separately. - File extensions will apply to any file name with the defined extension if a path or folder is not defined. + >[!IMPORTANT] >The use of wildcards such as the asterisk (\*) will alter how the exclusion rules are interpreted. See the [Use wildcards in the file name and folder path or extension exclusion lists](#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists) section for important information about how wildcards work. + >You cannot exclude mapped network drives. You must specify the actual network path. >Folders that are reparse points that are created after the Windows Defender Antivirus service starts and that have been added to the exclusion list will not be included. You must restart the service (by restarting Windows) for new reparse points to be recognized as a valid exclusion target. @@ -56,6 +58,7 @@ To exclude files opened by a specific process, see [Configure and validate exclu The exclusions apply to [scheduled scans](scheduled-catch-up-scans-windows-defender-antivirus.md), [on-demand scans](run-scan-windows-defender-antivirus.md), and [real-time protection](configure-real-time-protection-windows-defender-antivirus.md). + >[!IMPORTANT] >Exclusion list changes made with Group Policy **will show** in the lists in the [Windows Security app](windows-defender-security-center-antivirus.md#exclusions). >Changes made in the Windows Security app **will not show** in the Group Policy lists. From 5980d15305a14680ce91918d0618ddbf822d0bab Mon Sep 17 00:00:00 2001 From: illfated Date: Wed, 1 May 2019 21:34:03 +0200 Subject: [PATCH 41/55] Add back 3 removed unrelated note lines Adding back the 3 lines you removed outside of the added note. One of the last line changes was correctly placed, but missing the > character to keep the block together. --- ...-extension-file-exclusions-windows-defender-antivirus.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index fb528fe1b5..eb2bdd0120 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -47,10 +47,10 @@ This means the exclusion lists have the following characteristics: - Folder exclusions will apply to all files and folders under that folder, unless the subfolder is a reparse point. Reparse point subfolders must be excluded separately. - File extensions will apply to any file name with the defined extension if a path or folder is not defined. - >[!IMPORTANT] +> >The use of wildcards such as the asterisk (\*) will alter how the exclusion rules are interpreted. See the [Use wildcards in the file name and folder path or extension exclusion lists](#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists) section for important information about how wildcards work. - +> >You cannot exclude mapped network drives. You must specify the actual network path. >Folders that are reparse points that are created after the Windows Defender Antivirus service starts and that have been added to the exclusion list will not be included. You must restart the service (by restarting Windows) for new reparse points to be recognized as a valid exclusion target. @@ -58,9 +58,9 @@ To exclude files opened by a specific process, see [Configure and validate exclu The exclusions apply to [scheduled scans](scheduled-catch-up-scans-windows-defender-antivirus.md), [on-demand scans](run-scan-windows-defender-antivirus.md), and [real-time protection](configure-real-time-protection-windows-defender-antivirus.md). - >[!IMPORTANT] >Exclusion list changes made with Group Policy **will show** in the lists in the [Windows Security app](windows-defender-security-center-antivirus.md#exclusions). +> >Changes made in the Windows Security app **will not show** in the Group Policy lists. By default, local changes made to the lists (by users with administrator privileges, including changes made with PowerShell and WMI) will be merged with the lists as defined (and deployed) by Group Policy, Configuration Manager, or Intune. The Group Policy lists will take precedence in case of conflicts. From 4535992c16391611358d5efa0d4f550ba7bdc4fc Mon Sep 17 00:00:00 2001 From: Jose Gabriel Ortega Castro Date: Wed, 1 May 2019 15:20:51 -0500 Subject: [PATCH 42/55] Lines Corrections --- ...gure-extension-file-exclusions-windows-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md index eb2bdd0120..7e70db0e6b 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md @@ -48,10 +48,10 @@ This means the exclusion lists have the following characteristics: - File extensions will apply to any file name with the defined extension if a path or folder is not defined. >[!IMPORTANT] -> >The use of wildcards such as the asterisk (\*) will alter how the exclusion rules are interpreted. See the [Use wildcards in the file name and folder path or extension exclusion lists](#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists) section for important information about how wildcards work. > >You cannot exclude mapped network drives. You must specify the actual network path. +> >Folders that are reparse points that are created after the Windows Defender Antivirus service starts and that have been added to the exclusion list will not be included. You must restart the service (by restarting Windows) for new reparse points to be recognized as a valid exclusion target. To exclude files opened by a specific process, see [Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-windows-defender-antivirus.md). From 3258eabd317563f89e2d6f4357978f774d5ea5c5 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 1 May 2019 13:38:47 -0700 Subject: [PATCH 43/55] edits --- ...nfigure-block-at-first-sight-windows-defender-antivirus.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md index 3047644d49..0cc19e576d 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md @@ -22,7 +22,7 @@ ms.date: 05/01/2019 Block at first sight is a feature of next gen protection that provides a way to detect and block new malware within seconds. -It is enabled by default when certain pre-requisite settings are also enabled. In most cases, these pre-requisite settings are also enabled by default, so the feature is running without any intervention. You can use group policy settings to confirm the feature is enabled. +It is enabled by default when certain pre-requisite settings are also enabled. In most cases, these pre-requisite settings are also enabled by default, so the feature is running without any intervention. You can [specify how long the file should be prevented from running](configure-cloud-block-timeout-period-windows-defender-antivirus.md) while the cloud-based protection service analyzes the file. @@ -45,7 +45,7 @@ In many cases, this process can reduce the response time for new malware from ho ## Confirm and validate that block at first sight is enabled -Block at first sight requires a number of Group Policy settings to be configured correctly or it will not work. These settings are enabled by default in most enterprise Windows Defender Antivirus deployments. +Block at first sight requires a number of settings to be configured correctly or it will not work. These settings are enabled by default in most enterprise Windows Defender Antivirus deployments. ### Confirm block at first sight is enabled with Intune From 6e4735c4ab4e50e39b594a14c11c04b16328b2b3 Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Wed, 1 May 2019 15:30:29 -0700 Subject: [PATCH 44/55] Update advanced-features-windows-defender-advanced-threat-protection.md Updated MTE note --- ...ed-features-windows-defender-advanced-threat-protection.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index 1a5889fe4f..5a9f3cebe8 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -91,10 +91,10 @@ When you enable this feature, you'll be able to incorporate data from Office 365 To receive contextual machine integration in Office 365 Threat Intelligence, you'll need to enable the Windows Defender ATP settings in the Security & Compliance dashboard. For more information, see [Office 365 Threat Intelligence overview](https://support.office.com/en-us/article/Office-365-Threat-Intelligence-overview-32405DA5-BEE1-4A4B-82E5-8399DF94C512). ## Microsoft Threat Experts -Out of the two Microsoft Threat Expert components, targeted attack notification is on general availability, while experts-on-demand capability is still in preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. You can receive targeted attack notifications from Microsoft Threat Experts through your Windows Defender ATP portal's alerts dashboard and via email if you configure it. +Out of the two Microsoft Threat Expert components, targeted attack notification is in general availability, while experts-on-demand capability is still in preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. You can receive targeted attack notifications from Microsoft Threat Experts through your Windows Defender ATP portal's alerts dashboard and via email if you configure it. >[!NOTE] ->This capability is available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security) +>Microsoft Threat Expert is available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security). ## Microsoft Cloud App Security Enabling this setting forwards Windows Defender ATP signals to Microsoft Cloud App Security to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Cloud App Security data. From 196366e48d97d121061cb50a58c11eec5ceb0b6d Mon Sep 17 00:00:00 2001 From: Dulce Montemayor Date: Wed, 1 May 2019 16:14:44 -0700 Subject: [PATCH 45/55] Update advanced-features-windows-defender-advanced-threat-protection.md Updated MTE note --- ...nced-features-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md index 5a9f3cebe8..dcde0ef2fe 100644 --- a/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/advanced-features-windows-defender-advanced-threat-protection.md @@ -94,7 +94,7 @@ To receive contextual machine integration in Office 365 Threat Intelligence, you Out of the two Microsoft Threat Expert components, targeted attack notification is in general availability, while experts-on-demand capability is still in preview. You can only use the experts-on-demand capability if you have applied for preview and your application has been approved. You can receive targeted attack notifications from Microsoft Threat Experts through your Windows Defender ATP portal's alerts dashboard and via email if you configure it. >[!NOTE] ->Microsoft Threat Expert is available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security). +>The Microsoft Threat Experts capability in Windows Defender ATP is available with an E5 license for [Enterprise Mobility + Security](https://www.microsoft.com/cloud-platform/enterprise-mobility-security). ## Microsoft Cloud App Security Enabling this setting forwards Windows Defender ATP signals to Microsoft Cloud App Security to provide deeper visibility into cloud application usage. Forwarded data is stored and processed in the same location as your Cloud App Security data. From 5d77662d2114c827b8f917760064dff1d6922a46 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 1 May 2019 18:17:24 -0700 Subject: [PATCH 46/55] Added missing xrefs and updated warning --- .../policy-configuration-service-provider.md | 264 ++++++++++++------ .../mdm/policy-csp-accounts.md | 31 +- .../mdm/policy-csp-applicationmanagement.md | 39 ++- .../mdm/policy-csp-authentication.md | 36 ++- .../mdm/policy-csp-bluetooth.md | 35 ++- .../mdm/policy-csp-browser.md | 45 ++- .../mdm/policy-csp-connectivity.md | 34 ++- .../mdm/policy-csp-devicelock.md | 47 +++- .../mdm/policy-csp-experience.md | 36 ++- .../mdm/policy-csp-privacy.md | 36 ++- .../mdm/policy-csp-search.md | 29 +- .../mdm/policy-csp-security.md | 34 ++- .../mdm/policy-csp-settings.md | 31 +- .../mdm/policy-csp-speech.md | 31 +- .../mdm/policy-csp-system.md | 38 ++- .../mdm/policy-csp-update.md | 49 +++- .../client-management/mdm/policy-csp-wifi.md | 45 +-- 17 files changed, 592 insertions(+), 268 deletions(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 00d74b6472..37b8033670 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -7,13 +7,13 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 03/01/2019 +ms.date: 05/01/2019 --- # Policy CSP > [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. The Policy configuration service provider enables the enterprise to configure policies on Windows 10. Use this configuration service provider to configure any company policies. @@ -4984,102 +4984,180 @@ The following diagram shows the Policy configuration service provider in tree fo - [WirelessDisplay/AllowProjectionToPC](./policy-csp-wirelessdisplay.md#wirelessdisplay-allowprojectiontopc) - [WirelessDisplay/RequirePinForPairing](./policy-csp-wirelessdisplay.md#wirelessdisplay-requirepinforpairing) + +## Policies supported by Windows Holographic for Business + +- [Accounts/AllowMicrosoftAccountConnection](#accounts-allowmicrosoftaccountconnection) +- [ApplicationManagement/AllowAllTrustedApps](#applicationmanagement-allowalltrustedapps) +- [ApplicationManagement/AllowAppStoreAutoUpdate](#applicationmanagement-allowappstoreautoupdate) +- [ApplicationManagement/AllowDeveloperUnlock](#applicationmanagement-allowdeveloperunlock) +- [Authentication/AllowFastReconnect](#authentication-allowfastreconnect) +- [Authentication/PreferredAadTenantDomainName](#authentication-preferredaadtenantdomainname) +- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising) +- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode) +- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename) +- [Browser/AllowAutofill](#browser-allowautofill) +- [Browser/AllowCookies](#browser-allowcookies) +- [Browser/AllowDoNotTrack](#browser-allowdonottrack) +- [Browser/AllowPasswordManager](#browser-allowpasswordmanager) +- [Browser/AllowPopups](#browser-allowpopups) +- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar) +- [Browser/AllowSmartScreen](#browser-allowsmartscreen) +- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth) +- [Connectivity/AllowUSBConnection](#connectivity-allowusbconnection) +- [DeviceLock/AllowIdleReturnWithoutPassword](#devicelock-allowidlereturnwithoutpassword) +- [DeviceLock/AllowSimpleDevicePassword](#devicelock-allowsimpledevicepassword) +- [DeviceLock/AlphanumericDevicePasswordRequired](#devicelock-alphanumericdevicepasswordrequired) +- [DeviceLock/DevicePasswordEnabled](#devicelock-devicepasswordenabled) +- [DeviceLock/DevicePasswordHistory](#devicelock-devicepasswordhistory) +- [DeviceLock/MaxDevicePasswordFailedAttempts](#devicelock-maxdevicepasswordfailedattempts) +- [DeviceLock/MaxInactivityTimeDeviceLock](#devicelock-maxinactivitytimedevicelock) +- [DeviceLock/MinDevicePasswordComplexCharacters](#devicelock-mindevicepasswordcomplexcharacters) +- [DeviceLock/MinDevicePasswordLength](#devicelock-mindevicepasswordlength) +- [Experience/AllowCortana](#experience-allowcortana) +- [Privacy/AllowInputPersonalization](#privacy-allowinputpersonalization) +- [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation) +- [Security/RequireDeviceEncryption](#security-requiredeviceencryption) +- [Settings/AllowDateTime](#settings-allowdatetime) +- [Settings/AllowVPN](#settings-allowvpn) +- [Speech/AllowSpeechModelUpdate](#speech-allowspeechmodelupdate) +- [System/AllowLocation](#system-allowlocation) +- [System/AllowTelemetry](#system-allowtelemetry) +- [Update/AllowAutoUpdate](#update-allowautoupdate) +- [Update/AllowUpdateService](#update-allowupdateservice) +- [Update/RequireDeferUpgrade](#update-requiredeferupgrade) +- [Update/RequireUpdateApproval](#update-requireupdateapproval) +- [Update/ScheduledInstallDay](#update-scheduledinstallday) +- [Update/ScheduledInstallTime](#update-scheduledinstalltime) +- [Update/UpdateServiceUrl](#update-updateserviceurl) +- [Wifi/AllowManualWiFiConfiguration](policy-csp-wifi.md#wifi-allowmanualwificonfiguration) + + -## Policies supported by Windows Holographic for Business - -- [Accounts/AllowMicrosoftAccountConnection](#accounts-allowmicrosoftaccountconnection) -- [ApplicationManagement/AllowAllTrustedApps](#applicationmanagement-allowalltrustedapps) -- [ApplicationManagement/AllowAppStoreAutoUpdate](#applicationmanagement-allowappstoreautoupdate) -- [ApplicationManagement/AllowDeveloperUnlock](#applicationmanagement-allowdeveloperunlock) -- [Authentication/AllowFastReconnect](#authentication-allowfastreconnect) -- [Authentication/PreferredAadTenantDomainName​](#authentication-preferredaadtenantdomainname) -- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising) -- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode) -- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename) -- [Browser/AllowAutofill​](#browser-allowautofill) -- [Browser/AllowCookies](#browser-allowcookies) -- [Browser/AllowDoNotTrack](#browser-allowdonottrack) -- [Browser/AllowPasswordManager](#browser-allowpasswordmanager) -- [Browser/AllowPopups](#browser-allowpopups) -- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar) -- [Browser/AllowSmartScreen](#browser-allowsmartscreen) -- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth) -- [Connectivity/AllowUSBConnection​](#connectivity-allowusbconnection) -- [DeviceLock/AllowIdleReturnWithoutPassword](#devicelock-allowidlereturnwithoutpassword) -- [DeviceLock/AllowSimpleDevicePassword](#devicelock-allowsimpledevicepassword) -- [DeviceLock/AlphanumericDevicePasswordRequired](#devicelock-alphanumericdevicepasswordrequired) -- [DeviceLock/DevicePasswordEnabled](#devicelock-devicepasswordenabled) -- [DeviceLock/DevicePasswordHistory](#devicelock-devicepasswordhistory) -- [DeviceLock/MaxDevicePasswordFailedAttempts](#devicelock-maxdevicepasswordfailedattempts) -- [DeviceLock/MaxInactivityTimeDeviceLock](#devicelock-maxinactivitytimedevicelock) -- [DeviceLock/MinDevicePasswordComplexCharacters](#devicelock-mindevicepasswordcomplexcharacters) -- [DeviceLock/MinDevicePasswordLength](#devicelock-mindevicepasswordlength) -- [Experience/AllowCortana](#experience-allowcortana) -- [Privacy/AllowInputPersonalization](#privacy-allowinputpersonalization) -- [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation) -- [Security/RequireDeviceEncryption](#security-requiredeviceencryption) -- [Settings/AllowDateTime](#settings-allowdatetime) -- [Settings/AllowVPN](#settings-allowvpn) -- [Speech/AllowSpeechModelUpdate](#speech-allowspeechmodelupdate) -- [System/AllowLocation](#system-allowlocation) -- [System/AllowTelemetry](#system-allowtelemetry) -- [Update/AllowAutoUpdate](#update-allowautoupdate) -- [Update/AllowUpdateService](#update-allowupdateservice) -- [Update/RequireDeferUpgrade](#update-requiredeferupgrade) -- [Update/RequireUpdateApproval](#update-requireupdateapproval) -- [Update/ScheduledInstallDay​](#update-scheduledinstallday) -- [Update/ScheduledInstallTime](#update-scheduledinstalltime) -- [Update/UpdateServiceUrl](#update-updateserviceurl) -- [Wifi/AllowManualWiFiConfiguration](policy-csp-wifi.md#wifi-allowmanualwificonfiguration) - - ## Policies supported by Windows Holographic -- [Accounts/AllowMicrosoftAccountConnection](#accounts-allowmicrosoftaccountconnection) -- [ApplicationManagement/AllowAppStoreAutoUpdate](#applicationmanagement-allowappstoreautoupdate) -- [ApplicationManagement/AllowDeveloperUnlock](#applicationmanagement-allowdeveloperunlock) -- [ApplicationManagement/AllowAllTrustedApps](#applicationmanagement-allowalltrustedapps) -- [Authentication/AllowFastReconnect](#authentication-allowfastreconnect) -- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising) -- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode) -- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename) -- [Browser/AllowDoNotTrack](#browser-allowdonottrack) -- [Browser/AllowPasswordManager](#browser-allowpasswordmanager) -- [Browser/AllowPopups](#browser-allowpopups) -- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar) -- [Browser/AllowSmartScreen](#browser-allowsmartscreen) -- [Browser/AllowCookies](#browser-allowcookies) -- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth) -- [Connectivity/AllowUSBConnection](#connectivity-allowusbconnection) -- [DeviceLock/AllowSimpleDevicePassword](#devicelock-allowsimpledevicepassword) -- [DeviceLock/MaxDevicePasswordFailedAttempts](#devicelock-maxdevicepasswordfailedattempts) -- [DeviceLock/MaxInactivityTimeDeviceLock](#devicelock-maxinactivitytimedevicelock) -- [DeviceLock/MinDevicePasswordLength](#devicelock-mindevicepasswordlength) -- [DeviceLock/DevicePasswordHistory](#devicelock-devicepasswordhistory) -- [DeviceLock/AlphanumericDevicePasswordRequired](#devicelock-alphanumericdevicepasswordrequired) -- [DeviceLock/MinDevicePasswordComplexCharacters](#devicelock-mindevicepasswordcomplexcharacters) -- [DeviceLock/AllowIdleReturnWithoutPassword](#devicelock-allowidlereturnwithoutpassword) -- [DeviceLock/DevicePasswordEnabled](#devicelock-devicepasswordenabled) -- [Experience/AllowCortana](#experience-allowcortana) -- [Privacy/AllowInputPersonalization](#privacy-allowinputpersonalization) -- [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation) -- [Security/RequireDeviceEncryption](#security-requiredeviceencryption) -- [Settings/AllowDateTime](#settings-allowdatetime) -- [Settings/AllowVPN](#settings-allowvpn) -- [Speech/AllowSpeechModelUpdate](#speech-allowspeechmodelupdate) -- [System/AllowTelemetry](#system-allowtelemetry) -- [System/AllowLocation](#system-allowlocation) -- [Update/AllowAutoUpdate](#update-allowautoupdate) -- [Update/AllowUpdateService](#update-allowupdateservice) -- [Update/RequireUpdateApproval](#update-requireupdateapproval) -- [Update/ScheduledInstallDay](#update-scheduledinstallday) -- [Update/ScheduledInstallTime](#update-scheduledinstalltime) -- [Update/UpdateServiceUrl](#update-updateserviceurl) -- [Update/RequireDeferUpgrade](#update-requiredeferupgrade) -- [Wifi/AllowManualWiFiConfiguration](policy-csp-wifi.md#wifi-allowmanualwificonfiguration) - +- [Accounts/AllowMicrosoftAccountConnection](#accounts-allowmicrosoftaccountconnection) +- [ApplicationManagement/AllowAppStoreAutoUpdate](#applicationmanagement-allowappstoreautoupdate) +- [ApplicationManagement/AllowDeveloperUnlock](#applicationmanagement-allowdeveloperunlock) +- [ApplicationManagement/AllowAllTrustedApps](#applicationmanagement-allowalltrustedapps) +- [Authentication/AllowFastReconnect](#authentication-allowfastreconnect) +- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising) +- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode) +- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename) +- [Browser/AllowDoNotTrack](#browser-allowdonottrack) +- [Browser/AllowPasswordManager](#browser-allowpasswordmanager) +- [Browser/AllowPopups](#browser-allowpopups) +- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar) +- [Browser/AllowSmartScreen](#browser-allowsmartscreen) +- [Browser/AllowCookies](#browser-allowcookies) +- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth) +- [Connectivity/AllowUSBConnection](#connectivity-allowusbconnection) +- [DeviceLock/AllowSimpleDevicePassword](#devicelock-allowsimpledevicepassword) +- [DeviceLock/MaxDevicePasswordFailedAttempts](#devicelock-maxdevicepasswordfailedattempts) +- [DeviceLock/MaxInactivityTimeDeviceLock](#devicelock-maxinactivitytimedevicelock) +- [DeviceLock/MinDevicePasswordLength](#devicelock-mindevicepasswordlength) +- [DeviceLock/DevicePasswordHistory](#devicelock-devicepasswordhistory) +- [DeviceLock/AlphanumericDevicePasswordRequired](#devicelock-alphanumericdevicepasswordrequired) +- [DeviceLock/MinDevicePasswordComplexCharacters](#devicelock-mindevicepasswordcomplexcharacters) +- [DeviceLock/AllowIdleReturnWithoutPassword](#devicelock-allowidlereturnwithoutpassword) +- [DeviceLock/DevicePasswordEnabled](#devicelock-devicepasswordenabled) +- [Experience/AllowCortana](#experience-allowcortana) +- [Privacy/AllowInputPersonalization](#privacy-allowinputpersonalization) +- [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation) +- [Security/RequireDeviceEncryption](#security-requiredeviceencryption) +- [Settings/AllowDateTime](#settings-allowdatetime) +- [Settings/AllowVPN](#settings-allowvpn) +- [Speech/AllowSpeechModelUpdate](#speech-allowspeechmodelupdate) +- [System/AllowTelemetry](#system-allowtelemetry) +- [System/AllowLocation](#system-allowlocation) +- [Update/AllowAutoUpdate](#update-allowautoupdate) +- [Update/AllowUpdateService](#update-allowupdateservice) +- [Update/RequireUpdateApproval](#update-requireupdateapproval) +- [Update/ScheduledInstallDay](#update-scheduledinstallday) +- [Update/ScheduledInstallTime](#update-scheduledinstalltime) +- [Update/UpdateServiceUrl](#update-updateserviceurl) +- [Update/RequireDeferUpgrade](#update-requiredeferupgrade) +- [Wifi/AllowManualWiFiConfiguration](policy-csp-wifi.md#wifi-allowmanualwificonfiguration) + +## Policies supported by Microsoft Surface Hub + +- [Camera/AllowCamera](#camera-allowcamera) +- [Cellular/ShowAppCellularAccessUI](#cellular-showappcellularaccessui) +- [Cryptography/AllowFipsAlgorithmPolicy](#cryptography-allowfipsalgorithmpolicy) +- [Cryptography/TLSCipherSuites](#cryptography-tlsciphersuites) +- [Defender/AllowArchiveScanning](#defender-allowarchivescanning) +- [Defender/AllowBehaviorMonitoring](#defender-allowbehaviormonitoring) +- [Defender/AllowCloudProtection](#defender-allowcloudprotection) +- [Defender/AllowEmailScanning](#defender-allowemailscanning) +- [Defender/AllowFullScanOnMappedNetworkDrives](#defender-allowfullscanonmappednetworkdrives) +- [Defender/AllowFullScanRemovableDriveScanning](#defender-allowfullscanremovabledrivescanning) +- [Defender/AllowIOAVProtection](#defender-allowioavprotection) +- [Defender/AllowIntrusionPreventionSystem](#defender-allowintrusionpreventionsystem) +- [Defender/AllowOnAccessProtection](#defender-allowonaccessprotection) +- [Defender/AllowRealtimeMonitoring](#defender-allowrealtimemonitoring) +- [Defender/AllowScanningNetworkFiles](#defender-allowscanningnetworkfiles) +- [Defender/AllowScriptScanning](#defender-allowscriptscanning) +- [Defender/AllowUserUIAccess](#defender-allowuseruiaccess) +- [Defender/AvgCPULoadFactor](#defender-avgcpuloadfactor) +- [Defender/DaysToRetainCleanedMalware](#defender-daystoretaincleanedmalware) +- [Defender/ExcludedExtensions](#defender-excludedextensions) +- [Defender/ExcludedPaths](#defender-excludedpaths) +- [Defender/ExcludedProcesses](#defender-excludedprocesses) +- [Defender/PUAProtection](#defender-puaprotection) +- [Defender/RealTimeScanDirection](#defender-realtimescandirection) +- [Defender/ScanParameter](#defender-scanparameter) +- [Defender/ScheduleQuickScanTime](#defender-schedulequickscantime) +- [Defender/ScheduleScanDay](#defender-schedulescanday) +- [Defender/ScheduleScanTime](#defender-schedulescantime) +- [Defender/SignatureUpdateInterval](#defender-signatureupdateinterval) +- [Defender/SubmitSamplesConsent](#defender-submitsamplesconsent) +- [Defender/ThreatSeverityDefaultAction](#defender-threatseveritydefaultaction) +- [DeliveryOptimization/DOAbsoluteMaxCacheSize](#deliveryoptimization-doabsolutemaxcachesize) +- [DeliveryOptimization/DOAllowVPNPeerCaching](#deliveryoptimization-doallowvpnpeercaching) +- [DeliveryOptimization/DODownloadMode](#deliveryoptimization-dodownloadmode) +- [DeliveryOptimization/DOGroupId](#deliveryoptimization-dogroupid) +- [DeliveryOptimization/DOMaxCacheAge](#deliveryoptimization-domaxcacheage) +- [DeliveryOptimization/DOMaxCacheSize](#deliveryoptimization-domaxcachesize) +- [DeliveryOptimization/DOMaxDownloadBandwidth](#deliveryoptimization-domaxdownloadbandwidth) +- [DeliveryOptimization/DOMaxUploadBandwidth](#deliveryoptimization-domaxuploadbandwidth) +- [DeliveryOptimization/DOMinBackgroundQos](#deliveryoptimization-dominbackgroundqos) +- [DeliveryOptimization/DOMinDiskSizeAllowedToPeer](#deliveryoptimization-domindisksizeallowedtopeer) +- [DeliveryOptimization/DOMinFileSizeToCache](#deliveryoptimization-dominfilesizetocache) +- [DeliveryOptimization/DOMinRAMAllowedToPeer](#deliveryoptimization-dominramallowedtopeer) +- [DeliveryOptimization/DOModifyCacheDrive](#deliveryoptimization-domodifycachedrive) +- [DeliveryOptimization/DOMonthlyUploadDataCap](#deliveryoptimization-domonthlyuploaddatacap) +- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](#deliveryoptimization-dopercentagemaxdownloadbandwidth) +- [Desktop/PreventUserRedirectionOfProfileFolders](#desktop-preventuserredirectionofprofilefolders) +- [TextInput/AllowIMELogging](#textinput-allowimelogging) +- [TextInput/AllowIMENetworkAccess](#textinput-allowimenetworkaccess) +- [TextInput/AllowInputPanel](#textinput-allowinputpanel) +- [TextInput/AllowJapaneseIMESurrogatePairCharacters](#textinput-allowjapaneseimesurrogatepaircharacters) +- [TextInput/AllowJapaneseIVSCharacters](#textinput-allowjapaneseivscharacters) +- [TextInput/AllowJapaneseNonPublishingStandardGlyph](#textinput-allowjapanesenonpublishingstandardglyph) +- [TextInput/AllowJapaneseUserDictionary](#textinput-allowjapaneseuserdictionary) +- [TextInput/AllowLanguageFeaturesUninstall](#textinput-allowlanguagefeaturesuninstall) +- [TextInput/ExcludeJapaneseIMEExceptJIS0208](#textinput-excludejapaneseimeexceptjis0208) +- [TextInput/ExcludeJapaneseIMEExceptJIS0208andEUDC](#textinput-excludejapaneseimeexceptjis0208andeudc) +- [TextInput/ExcludeJapaneseIMEExceptShiftJIS](#textinput-excludejapaneseimeexceptshiftjis) +- [WiFi/AllowWiFiHotSpotReporting](#wifi-allowwifihotspotreporting) + + + +## Policies supported by Windows 10 IoT Core + +- [Camera/AllowCamera](#camera-allowcamera) +- [Cellular/ShowAppCellularAccessUI](#cellular-showappcellularaccessui) +- [CredentialProviders/AllowPINLogon](#credentialproviders-allowpinlogon) +- [CredentialProviders/BlockPicturePassword](#credentialproviders-blockpicturepassword) +- [DataProtection/AllowDirectMemoryAccess](#dataprotection-allowdirectmemoryaccess) +- [Wifi/AllowAutoConnectToWiFiSenseHotspots](#wifi-allowautoconnecttowifisensehotspots) +- [Wifi/AllowInternetSharing](#wifi-allowinternetsharing) +- [Wifi/AllowWiFi](#wifi-allowwifi) +- [Wifi/WLANScanMode](#wifi-wlanscanmode) + + ## Policies that can be set using Exchange Active Sync (EAS) diff --git a/windows/client-management/mdm/policy-csp-accounts.md b/windows/client-management/mdm/policy-csp-accounts.md index dc3c75da62..882f3767a3 100644 --- a/windows/client-management/mdm/policy-csp-accounts.md +++ b/windows/client-management/mdm/policy-csp-accounts.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 07/30/2018 +ms.date: 05/01/2019 --- # Policy CSP - Accounts @@ -240,15 +240,28 @@ The default value is an empty string, which allows all email accounts on the dev -


- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. + +## Accounts policies supported by Windows Holographic + +- [Accounts/AllowMicrosoftAccountConnection](#accounts-allowmicrosoftaccountconnection) + + + +## Accounts policies supported by Windows Holographic for Business + +- [Accounts/AllowMicrosoftAccountConnection](#accounts-allowmicrosoftaccountconnection) + + +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. diff --git a/windows/client-management/mdm/policy-csp-applicationmanagement.md b/windows/client-management/mdm/policy-csp-applicationmanagement.md index c936dbc5db..994c53f7ca 100644 --- a/windows/client-management/mdm/policy-csp-applicationmanagement.md +++ b/windows/client-management/mdm/policy-csp-applicationmanagement.md @@ -6,13 +6,13 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 08/08/2018 +ms.date: 05/01/2019 --- # Policy CSP - ApplicationManagement > [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
@@ -1038,16 +1038,31 @@ XSD: -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. + +## ApplicationManagement policies supported by Windows Holographic +- [ApplicationManagement/AllowAppStoreAutoUpdate](#applicationmanagement-allowappstoreautoupdate) +- [ApplicationManagement/AllowDeveloperUnlock](#applicationmanagement-allowdeveloperunlock) +- [ApplicationManagement/AllowAllTrustedApps](#applicationmanagement-allowalltrustedapps) + + + +## ApplicationManagement policies supported by Windows Holographic for Business + +- [ApplicationManagement/AllowAppStoreAutoUpdate](#applicationmanagement-allowappstoreautoupdate) +- [ApplicationManagement/AllowDeveloperUnlock](#applicationmanagement-allowdeveloperunlock) +- [ApplicationManagement/AllowAllTrustedApps](#applicationmanagement-allowalltrustedapps) + + +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in the next major release of Windows 10. diff --git a/windows/client-management/mdm/policy-csp-authentication.md b/windows/client-management/mdm/policy-csp-authentication.md index b40a98a737..7708a220e7 100644 --- a/windows/client-management/mdm/policy-csp-authentication.md +++ b/windows/client-management/mdm/policy-csp-authentication.md @@ -6,13 +6,13 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 07/30/2018 +ms.date: 05/01/2019 --- # Policy CSP - Authentication > [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
@@ -491,15 +491,27 @@ Value type is string. -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. + +## Authentication policies supported by Windows Holographic + +- [Authentication/AllowFastReconnect](#authentication-allowfastreconnect) + + + +## Authentication policies supported by Windows Holographic for Business + +- [Authentication/AllowFastReconnect](#authentication-allowfastreconnect) +- [Authentication/PreferredAadTenantDomainName](#authentication-preferredaadtenantdomainname) + +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in the next major release of Windows 10. \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index 82eb7ed2c3..8abc1aaa7a 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 11/15/2018 +ms.date: 05/01/2019 --- # Policy CSP - Bluetooth @@ -339,17 +339,34 @@ The default value is an empty string. For more information, see [ServicesAllowed -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. + +## Bluetooth policies supported by Windows Holographic + +- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising) +- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode) +- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename) + + + +## Bluetooth policies supported by Windows Holographic for Business + +- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising) +- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode) +- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename) + +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. + ## ServicesAllowedList usage guide When the Bluetooth/ServicesAllowedList policy is provisioned, it will only allow pairing and connections of Windows PCs and phones to explicitly defined Bluetooth profiles and services. It is an allowed list, enabling admins to still allow custom Bluetooth profiles that are not defined by the Bluetooth Special Interests Group (SIG). diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md index 9b9cc1b64f..cf8010c0ce 100644 --- a/windows/client-management/mdm/policy-csp-browser.md +++ b/windows/client-management/mdm/policy-csp-browser.md @@ -6,13 +6,13 @@ ms.prod: w10 ms.technology: windows author: shortpatti ms.author: pashort -ms.date: 10/02/2018 +ms.date: 05/01/2019 --- # Policy CSP - Browser > [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
@@ -3963,15 +3963,38 @@ Supported values: Most restricted value: 0 -
- -Footnote: - -- 1 - Supported versions, version 1607. -- 2 - Supported versions, version 1703. -- 3 - Supported versions, version 1709. -- 4 - Supported versions, version 1803. -- 5 - Supported versions, version 1809. + +## Browser policies supported by Windows Holographic + +- [Browser/AllowDoNotTrack](#browser-allowdonottrack) +- [Browser/AllowPasswordManager](#browser-allowpasswordmanager) +- [Browser/AllowPopups](#browser-allowpopups) +- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar) +- [Browser/AllowSmartScreen](#browser-allowsmartscreen) +- [Browser/AllowCookies](#browser-allowcookies) + + + +## Browser policies supported by Windows Holographic for Business + +- [Browser/AllowAutofill](#browser-allowautofill) +- [Browser/AllowDoNotTrack](#browser-allowdonottrack) +- [Browser/AllowPasswordManager](#browser-allowpasswordmanager) +- [Browser/AllowPopups](#browser-allowpopups) +- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar) +- [Browser/AllowSmartScreen](#browser-allowsmartscreen) +- [Browser/AllowCookies](#browser-allowcookies) + + +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. diff --git a/windows/client-management/mdm/policy-csp-connectivity.md b/windows/client-management/mdm/policy-csp-connectivity.md index 0806fb596a..34d9585326 100644 --- a/windows/client-management/mdm/policy-csp-connectivity.md +++ b/windows/client-management/mdm/policy-csp-connectivity.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 07/30/2018 +ms.date: 05/01/2019 --- # Policy CSP - Connectivity @@ -961,16 +961,32 @@ ADMX Info: -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. + +## Connectivity policies supported by Windows Holographic + +- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth) +- [Connectivity/AllowUSBConnection](#connectivity-allowusbconnection) + + + +## Connectivity policies supported by Windows Holographic for Business + +- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth) +- [Connectivity/AllowUSBConnection](#connectivity-allowusbconnection) + + +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. + diff --git a/windows/client-management/mdm/policy-csp-devicelock.md b/windows/client-management/mdm/policy-csp-devicelock.md index 4d766ec5f7..1d4948e92a 100644 --- a/windows/client-management/mdm/policy-csp-devicelock.md +++ b/windows/client-management/mdm/policy-csp-devicelock.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 08/08/2018 +ms.date: 05/01/2019 --- # Policy CSP - DeviceLock @@ -1205,14 +1205,43 @@ Most restricted value is 0. -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. + +## DeviceLock policies supported by Windows Holographic + +- [DeviceLock/AllowSimpleDevicePassword](#devicelock-allowsimpledevicepassword) +- [DeviceLock/MaxDevicePasswordFailedAttempts](#devicelock-maxdevicepasswordfailedattempts) +- [DeviceLock/MaxInactivityTimeDeviceLock](#devicelock-maxinactivitytimedevicelock) +- [DeviceLock/MinDevicePasswordLength](#devicelock-mindevicepasswordlength) +- [DeviceLock/DevicePasswordHistory](#devicelock-devicepasswordhistory) +- [DeviceLock/AlphanumericDevicePasswordRequired](#devicelock-alphanumericdevicepasswordrequired) +- [DeviceLock/MinDevicePasswordComplexCharacters](#devicelock-mindevicepasswordcomplexcharacters) +- [DeviceLock/AllowIdleReturnWithoutPassword](#devicelock-allowidlereturnwithoutpassword) +- [DeviceLock/DevicePasswordEnabled](#devicelock-devicepasswordenabled) + + + +## DeviceLock policies supported by Windows Holographic for Business + +- [DeviceLock/AllowSimpleDevicePassword](#devicelock-allowsimpledevicepassword) +- [DeviceLock/MaxDevicePasswordFailedAttempts](#devicelock-maxdevicepasswordfailedattempts) +- [DeviceLock/MaxInactivityTimeDeviceLock](#devicelock-maxinactivitytimedevicelock) +- [DeviceLock/MinDevicePasswordLength](#devicelock-mindevicepasswordlength) +- [DeviceLock/DevicePasswordHistory](#devicelock-devicepasswordhistory) +- [DeviceLock/AlphanumericDevicePasswordRequired](#devicelock-alphanumericdevicepasswordrequired) +- [DeviceLock/MinDevicePasswordComplexCharacters](#devicelock-mindevicepasswordcomplexcharacters) +- [DeviceLock/AllowIdleReturnWithoutPassword](#devicelock-allowidlereturnwithoutpassword) +- [DeviceLock/DevicePasswordEnabled](#devicelock-devicepasswordenabled) + + +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. diff --git a/windows/client-management/mdm/policy-csp-experience.md b/windows/client-management/mdm/policy-csp-experience.md index c267e4587c..c0d7b7cad4 100644 --- a/windows/client-management/mdm/policy-csp-experience.md +++ b/windows/client-management/mdm/policy-csp-experience.md @@ -6,13 +6,13 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 07/30/2018 +ms.date: 05/01/2019 --- # Policy CSP - Experience > [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
@@ -1569,17 +1569,27 @@ Validation procedure: -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. - + +## Experience policies supported by Windows Holographic +- [Experience/AllowCortana](#experience-allowcortana) + + + +## Experience policies supported by Windows Holographic for Business + +- [Experience/AllowCortana](#experience-allowcortana) + + +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in the next major release of Windows 10. \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-privacy.md b/windows/client-management/mdm/policy-csp-privacy.md index bccb2e581b..e59ee6fa01 100644 --- a/windows/client-management/mdm/policy-csp-privacy.md +++ b/windows/client-management/mdm/policy-csp-privacy.md @@ -6,13 +6,13 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 08/14/2018 +ms.date: 05/01/2019 --- # Policy CSP - Privacy > [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
@@ -4851,16 +4851,28 @@ ADMX Info: -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. + +## Privacy policies supported by Windows Holographic + +- [Privacy/AllowInputPersonalization](#privacy-allowinputpersonalization) + + + +## Privacy policies supported by Windows Holographic for Business + +- [Privacy/AllowInputPersonalization](#privacy-allowinputpersonalization) + + +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in the next major release of Windows 10. \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-search.md b/windows/client-management/mdm/policy-csp-search.md index f51a32f819..3106f2b945 100644 --- a/windows/client-management/mdm/policy-csp-search.md +++ b/windows/client-management/mdm/policy-csp-search.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 07/30/2018 +ms.date: 05/01/2019 --- # Policy CSP - Search @@ -849,16 +849,27 @@ The following list shows the supported values: -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. + +## Search policies supported by Windows Holographic +- [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation) + + +## Search policies supported by Windows Holographic for Business + +- [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation) + + +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-security.md b/windows/client-management/mdm/policy-csp-security.md index ec1d131e0d..e6bce4de0b 100644 --- a/windows/client-management/mdm/policy-csp-security.md +++ b/windows/client-management/mdm/policy-csp-security.md @@ -6,13 +6,13 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 08/09/2018 +ms.date: 05/01/2019 --- # Policy CSP - Security > [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
@@ -739,18 +739,28 @@ The following list shows the supported values: -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. + +## Security policies supported by Windows Holographic +- [Security/RequireDeviceEncryption](#security-requiredeviceencryption) + + +## Security policies supported by Windows Holographic for Business + +- [Security/RequireDeviceEncryption](#security-requiredeviceencryption) + + +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in the next major release of Windows 10. \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-settings.md b/windows/client-management/mdm/policy-csp-settings.md index fa1b94e71a..5ff09bf3e4 100644 --- a/windows/client-management/mdm/policy-csp-settings.md +++ b/windows/client-management/mdm/policy-csp-settings.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 08/09/2018 +ms.date: 05/01/2019 --- # Policy CSP - Settings @@ -839,16 +839,29 @@ To validate on Desktop, do the following: -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. + +## Settings policies supported by Windows Holographic +- [Settings/AllowDateTime](#settings-allowdatetime) +- [Settings/AllowVPN](#settings-allowvpn) + + +## Settings policies supported by Windows Holographic for Business + +- [Settings/AllowDateTime](#settings-allowdatetime) +- [Settings/AllowVPN](#settings-allowvpn) + + +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-speech.md b/windows/client-management/mdm/policy-csp-speech.md index 43023aecdc..bd274c38df 100644 --- a/windows/client-management/mdm/policy-csp-speech.md +++ b/windows/client-management/mdm/policy-csp-speech.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 08/09/2018 +ms.date: 05/01/2019 --- # Policy CSP - Speech @@ -82,14 +82,27 @@ The following list shows the supported values: -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. + +## Speech policies supported by Windows Holographic + +- [Speech/AllowSpeechModelUpdate](#speech-allowspeechmodelupdate) + + + +## Speech policies supported by Windows Holographic for Business + +- [Speech/AllowSpeechModelUpdate](#speech-allowspeechmodelupdate) + + +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md index 16bfa23ec7..77c58a2714 100644 --- a/windows/client-management/mdm/policy-csp-system.md +++ b/windows/client-management/mdm/policy-csp-system.md @@ -6,13 +6,13 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 08/24/2018 +ms.date: 05/01/2019 --- # Policy CSP - System > [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
@@ -1433,16 +1433,30 @@ ADMX Info: -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. + +## System policies supported by Windows Holographic + +- [System/AllowTelemetry](#system-allowtelemetry) +- [System/AllowLocation](#system-allowlocation) + + + +## System policies supported by Windows Holographic for Business + +- [System/AllowTelemetry](#system-allowtelemetry) +- [System/AllowLocation](#system-allowlocation) + + +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in the next major release of Windows 10. \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index 2e24ad1c47..ab8f25ac1d 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -6,13 +6,13 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 08/29/2018 +ms.date: 05/01/2019 --- # Policy CSP - Update > [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
@@ -3571,15 +3571,40 @@ ADMX Info: -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in the next major release of Windows 10. + + +## Update policies supported by Windows Holographic + +- [Update/AllowAutoUpdate](#update-allowautoupdate) +- [Update/AllowUpdateService](#update-allowupdateservice) +- [Update/RequireUpdateApproval](#update-requireupdateapproval) +- [Update/ScheduledInstallDay](#update-scheduledinstallday) +- [Update/ScheduledInstallTime](#update-scheduledinstalltime) +- [Update/UpdateServiceUrl](#update-updateserviceurl) +- [Update/RequireDeferUpgrade](#update-requiredeferupgrade) + + + +## Update policies supported by Windows Holographic for Business + +- [Update/AllowAutoUpdate](#update-allowautoupdate) +- [Update/AllowUpdateService](#update-allowupdateservice) +- [Update/RequireUpdateApproval](#update-requireupdateapproval) +- [Update/ScheduledInstallDay](#update-scheduledinstallday) +- [Update/ScheduledInstallTime](#update-scheduledinstalltime) +- [Update/UpdateServiceUrl](#update-updateserviceurl) +- [Update/RequireDeferUpgrade](#update-requiredeferupgrade) + + +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. +- 6 - Added in the next major release of Windows 10. \ No newline at end of file diff --git a/windows/client-management/mdm/policy-csp-wifi.md b/windows/client-management/mdm/policy-csp-wifi.md index 8d16e2c852..ff2649412f 100644 --- a/windows/client-management/mdm/policy-csp-wifi.md +++ b/windows/client-management/mdm/policy-csp-wifi.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 05/14/2018 +ms.date: 05/01/2019 --- # Policy CSP - Wifi @@ -379,36 +379,49 @@ Supported operations are Add, Delete, Get, and Replace. -
- -Footnote: - -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. ## Wifi policies that can be set using Exchange Active Sync (EAS) -- [Wifi/AllowInternetSharing](#wifi-allowinternetsharing) -- [Wifi/AllowWiFi](#wifi-allowwifi) +- [Wifi/AllowInternetSharing](#wifi-allowinternetsharing) +- [Wifi/AllowWiFi](#wifi-allowwifi) + +## Wifi policies supported by Windows Holographic + +- [Wifi/AllowManualWiFiConfiguration](#wifi-allowmanualwificonfiguration) + + + +## Wifi policies supported by Windows Holographic for Business + +- [Wifi/AllowManualWiFiConfiguration](#wifi-allowmanualwificonfiguration) + + ## Wifi policies supported by IoT Core -- [Wifi/AllowAutoConnectToWiFiSenseHotspots](#wifi-allowautoconnecttowifisensehotspots) -- [Wifi/AllowInternetSharing](#wifi-allowinternetsharing) -- [Wifi/AllowWiFi](#wifi-allowwifi) -- [Wifi/WLANScanMode](#wifi-wlanscanmode) +- [Wifi/AllowAutoConnectToWiFiSenseHotspots](#wifi-allowautoconnecttowifisensehotspots) +- [Wifi/AllowInternetSharing](#wifi-allowinternetsharing) +- [Wifi/AllowWiFi](#wifi-allowwifi) +- [Wifi/WLANScanMode](#wifi-wlanscanmode) ## Wifi policies supported by Microsoft Surface Hub -- [WiFi/AllowWiFiHotSpotReporting](#wifi-allowwifihotspotreporting) +- [WiFi/AllowWiFiHotSpotReporting](#wifi-allowwifihotspotreporting) +
+ +Footnotes: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. +- 4 - Added in Windows 10, version 1803. +- 5 - Added in Windows 10, version 1809. \ No newline at end of file From 3463aff605cfa1003ddf196f328527a7b23f912e Mon Sep 17 00:00:00 2001 From: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> Date: Thu, 2 May 2019 08:21:25 +0200 Subject: [PATCH 47/55] Update windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md Changed wording. Co-Authored-By: Reeced40 <49645174+Reeced40@users.noreply.github.com> --- .../upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md index 7758956656..32fb97cc0f 100644 --- a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md +++ b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md @@ -13,7 +13,7 @@ ms.topic: article # Use Upgrade Readiness to manage Windows upgrades >[!IMPORTANT] ->**The OMS portal has been deprecated; you should start using the [Azure portal](https://portal.azure.com) instead as soon as possible.** Many experiences are the same in the two portals, but there are some key differences. See [Windows Analytics in the Azure Portal](../update/windows-analytics-azure-portal.md) for steps to use Windows Analytics in the Azure portal. For much more information about the transition from OMS to Azure, see [OMS portal moving to Azure](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-portal-transition). [Get started with Upgrade Readiness](https://docs.microsoft.com/windows/deployment/upgrade/upgrade-readiness-get-started) +>**The OMS portal has been deprecated; you should start using the [Azure portal](https://portal.azure.com) instead as soon as possible.** Many experiences are the same in the two portals, but there are some key differences. See [Windows Analytics in the Azure Portal](../update/windows-analytics-azure-portal.md) for steps to use Windows Analytics in the Azure portal. For much more information about the transition from OMS to Azure, see [OMS portal moving to Azure](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-portal-transition) and [Get started with Upgrade Readiness](https://docs.microsoft.com/windows/deployment/upgrade/upgrade-readiness-get-started). You can use Upgrade Readiness to prioritize and work through application and driver issues, assign and track issue resolution status, and identify computers that are ready to upgrade. Upgrade Readiness enables you to deploy Windows with confidence, knowing that you’ve addressed potential blocking issues. From 8ea83fd5bb1e6b45be66f7fa1e5d5b4023c4f84d Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 2 May 2019 12:21:31 +0500 Subject: [PATCH 48/55] Reset netsh proxy As user requested, I have added netsh reset command for reference as well as attached the help doc to get more details related to netsh. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/3372 --- ...-internet-windows-defender-advanced-threat-protection.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md index 595b8af148..ad4ee5fc7e 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md @@ -87,6 +87,12 @@ netsh winhttp set proxy : ``` For example: netsh winhttp set proxy 10.0.0.6:8080 +To reset the winhttp proxy, enter the following command and press **Enter** +``` +netsh winhttp reset proxy +``` +To get more details how to use netsh command,[please see help doc](https://docs.microsoft.com/en-us/windows-server/networking/technologies/netsh/netsh-contexts). + ## Enable access to Windows Defender ATP service URLs in the proxy server If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that the following URLs are not blocked by default. Do not disable security monitoring or inspection of these URLs, but allow them as you would other internet traffic. They permit communication with Windows Defender ATP service in port 80 and 443: From 7b810981ee868e7227279be91bbc7ad0bce3785b Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Thu, 2 May 2019 10:54:38 +0200 Subject: [PATCH 49/55] Update windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md Changed wording. Co-Authored-By: Reeced40 <49645174+Reeced40@users.noreply.github.com> --- .../upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md index 32fb97cc0f..e3ad02a8ae 100644 --- a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md +++ b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md @@ -13,7 +13,7 @@ ms.topic: article # Use Upgrade Readiness to manage Windows upgrades >[!IMPORTANT] ->**The OMS portal has been deprecated; you should start using the [Azure portal](https://portal.azure.com) instead as soon as possible.** Many experiences are the same in the two portals, but there are some key differences. See [Windows Analytics in the Azure Portal](../update/windows-analytics-azure-portal.md) for steps to use Windows Analytics in the Azure portal. For much more information about the transition from OMS to Azure, see [OMS portal moving to Azure](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-portal-transition) and [Get started with Upgrade Readiness](https://docs.microsoft.com/windows/deployment/upgrade/upgrade-readiness-get-started). +>>**The OMS portal has been deprecated, so you need to switch to the [Azure portal](https://portal.azure.com) now.** The two portals offer the same experience, with some key differences. Learn how to use [Windows Analytics in the Azure Portal](../update/windows-analytics-azure-portal.md). Find out more about the [OMS portal moving to Azure](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-portal-transition), or jump right in and [Get started with Upgrade Readiness](https://docs.microsoft.com/windows/deployment/upgrade/upgrade-readiness-get-started). You can use Upgrade Readiness to prioritize and work through application and driver issues, assign and track issue resolution status, and identify computers that are ready to upgrade. Upgrade Readiness enables you to deploy Windows with confidence, knowing that you’ve addressed potential blocking issues. From 5b548688ea5cf4cea1d854835acd1096ea926e5d Mon Sep 17 00:00:00 2001 From: Nicole Turner <39884432+nenonix@users.noreply.github.com> Date: Thu, 2 May 2019 17:14:14 +0500 Subject: [PATCH 50/55] Update windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md Co-Authored-By: joinimran <47118050+joinimran@users.noreply.github.com> --- ...roxy-internet-windows-defender-advanced-threat-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md index ad4ee5fc7e..4f6abf1d7e 100644 --- a/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md @@ -91,7 +91,7 @@ To reset the winhttp proxy, enter the following command and press **Enter** ``` netsh winhttp reset proxy ``` -To get more details how to use netsh command,[please see help doc](https://docs.microsoft.com/en-us/windows-server/networking/technologies/netsh/netsh-contexts). +See [Netsh Command Syntax, Contexts, and Formatting](https://docs.microsoft.com/windows-server/networking/technologies/netsh/netsh-contexts) to learn more. ## Enable access to Windows Defender ATP service URLs in the proxy server If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that the following URLs are not blocked by default. Do not disable security monitoring or inspection of these URLs, but allow them as you would other internet traffic. They permit communication with Windows Defender ATP service in port 80 and 443: From 5b064efa56795626c15bb135f54baff98acc47a4 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Thu, 2 May 2019 09:01:59 -0700 Subject: [PATCH 51/55] Updated storage bookmark --- .../mdm/policy-configuration-service-provider.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 37b8033670..a27926a537 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -3101,7 +3101,7 @@ The following diagram shows the Policy configuration service provider in tree fo Storage/EnhancedStorageDevices
- Storage/RemovableDiskDenyWriteAccess + Storage/RemovableDiskDenyWriteAccess
From 451d5fc7b31d05d5a4015d95e5bc8964aff4a1cb Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Thu, 2 May 2019 12:37:17 -0700 Subject: [PATCH 52/55] Update manage-connections-from-windows-operating-system-components-to-microsoft-services.md --- ...erating-system-components-to-microsoft-services.md | 11 ++++------- 1 file changed, 4 insertions(+), 7 deletions(-) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index b46666da35..b85cedab91 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -1863,21 +1863,18 @@ You can disconnect from the Microsoft Antimalware Protection Service. - **Enable** the Group Policy **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Windows Defender Antivirus** > **MAPS** > **Join Microsoft MAPS** and then select **Disabled** from the drop down box named **Join Microsoft MAPS** - -or- +-OR- - Use the registry to set the REG_DWORD value **HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows Defender\\Spynet\\SpyNetReporting** to **0 (zero)**. - -or- + -and- - Delete the registry setting **named** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\Updates**. - -or- +-OR- - For Windows 10 only, apply the Defender/AllowClouldProtection MDM policy from the [Defender CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx). - -and- - - From an elevated Windows PowerShell prompt, run **set-mppreference -Mapsreporting 0** You can stop sending file samples back to Microsoft. @@ -2076,7 +2073,7 @@ On Windows Server 2016, this will block Microsoft Store calls from Universal Win You can turn off apps for websites, preventing customers who visit websites that are registered with their associated app from directly launching the app. -**Disable** the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Group Policy** > **Configure web-to-app linking with URI handlers** +- **Disable** the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Group Policy** > **Configure web-to-app linking with URI handlers** -or- From 86f1a544bacf349b2516b61f0c7b2d12d68a0da4 Mon Sep 17 00:00:00 2001 From: Mike Edgar <49731348+medgarmedgar@users.noreply.github.com> Date: Thu, 2 May 2019 12:42:30 -0700 Subject: [PATCH 53/55] Update manage-connections-from-windows-operating-system-components-to-microsoft-services.md --- ...system-components-to-microsoft-services.md | 21 ++++--------------- 1 file changed, 4 insertions(+), 17 deletions(-) diff --git a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index b46666da35..923bfedcb3 100644 --- a/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -1824,9 +1824,6 @@ You can disable Teredo by using Group Policy or by using the netsh.exe command. - Create a new REG_SZ registry setting named **Teredo_State** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\TCPIP\\v6Transition** with a value of **Disabled**. - -or- - -- From an elevated command prompt, run **netsh interface teredo set state disabled** ### 23. Wi-Fi Sense @@ -1847,13 +1844,6 @@ To turn off **Connect to suggested open hotspots** and **Connect to networks sha - Create a new REG_DWORD registry setting named **AutoConnectAllowedOEM** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\WcmSvc\\wifinetworkmanager\\config** with a **value of 0 (zero)**. - -or- - -- Change the Windows Provisioning setting, WiFISenseAllowed, to **0 (zero)**. For more info, see the Windows Provisioning Settings reference doc, [WiFiSenseAllowed](https://go.microsoft.com/fwlink/p/?LinkId=620909). - - -or- - -- Use the Unattended settings to set the value of WiFiSenseAllowed to **0 (zero)**. For more info, see the Unattended Windows Setup reference doc, [WiFiSenseAllowed](https://go.microsoft.com/fwlink/p/?LinkId=620910). When turned off, the Wi-Fi Sense settings still appear on the Wi-Fi Settings screen, but they’re non-functional and they can’t be controlled by the employee. @@ -1863,21 +1853,18 @@ You can disconnect from the Microsoft Antimalware Protection Service. - **Enable** the Group Policy **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Windows Defender Antivirus** > **MAPS** > **Join Microsoft MAPS** and then select **Disabled** from the drop down box named **Join Microsoft MAPS** - -or- +-OR- - Use the registry to set the REG_DWORD value **HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows Defender\\Spynet\\SpyNetReporting** to **0 (zero)**. - -or- + -and- - Delete the registry setting **named** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\Updates**. - -or- +-OR- - For Windows 10 only, apply the Defender/AllowClouldProtection MDM policy from the [Defender CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx). - -and- - - From an elevated Windows PowerShell prompt, run **set-mppreference -Mapsreporting 0** You can stop sending file samples back to Microsoft. @@ -2076,7 +2063,7 @@ On Windows Server 2016, this will block Microsoft Store calls from Universal Win You can turn off apps for websites, preventing customers who visit websites that are registered with their associated app from directly launching the app. -**Disable** the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Group Policy** > **Configure web-to-app linking with URI handlers** +- **Disable** the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Group Policy** > **Configure web-to-app linking with URI handlers** -or- From 4948c331dfa159fd5e08544c57d6112687f6a046 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 2 May 2019 14:13:32 -0700 Subject: [PATCH 54/55] added that hidde and system drives are no encrypted --- windows/client-management/mdm/bitlocker-csp.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index 17e70ad2c6..917fb0bafa 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: MariciaAlforque -ms.date: 12/06/2018 +ms.date: 05/02/2019 --- # BitLocker CSP @@ -136,7 +136,7 @@ The following diagram shows the BitLocker configuration service provider in tree

Data type is integer. Supported operations are Add, Get, Replace, and Delete.

**EncryptionMethodByDriveType** -

Allows you to set the default encrytion method for each of the different drive types. This setting is a direct mapping to the Bitlocker Group Policy "Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)".

+

Allows you to set the default encrytion method for each of the different drive types: operating system drives, fixed data drives, and removable data drives. Hidden, system and recovery partitions are skipped from encryption. This setting is a direct mapping to the Bitlocker Group Policy "Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)".

From 7fc831cf9b62ed6bc1b981e1b616e47e33d31003 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 2 May 2019 14:16:11 -0700 Subject: [PATCH 55/55] updates to ga --- ...indows-defender-advanced-threat-protection.md | 2 ++ .../microsoft-threat-experts.md | 2 +- ...indows-defender-advanced-threat-protection.md | 1 - .../whats-new-in-windows-defender-atp.md | 16 +++++++++------- 4 files changed, 12 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md index 25140e78df..0640796170 100644 --- a/windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/machine-reports-windows-defender-advanced-threat-protection.md @@ -20,6 +20,8 @@ ms.topic: article # Machine health and compliance report in Windows Defender ATP **Applies to:** - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +[!include[Prerelease information](prerelease.md)] The machines status report provides high-level information about the devices in your organization. The report includes trending information showing the sensor health state, antivirus status, OS platforms, and Windows 10 versions. diff --git a/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md b/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md index 8d0b702f6c..a0a7b1b3c9 100644 --- a/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md +++ b/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts.md @@ -15,7 +15,6 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 02/28/2019 --- # Microsoft Threat Experts @@ -24,6 +23,7 @@ ms.date: 02/28/2019 [!include[Prerelease information](prerelease.md)] + Microsoft Threat Experts is a managed hunting service that provides Security Operation Centers (SOCs) with expert level monitoring and analysis to help them ensure that critical threats in their unique environments don’t get missed. This new capability provides expert-driven insights and data through targeted attack notification and access to experts on demand. diff --git a/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md b/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md index c95bd47a62..fbc3680594 100644 --- a/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection.md @@ -22,7 +22,6 @@ ms.topic: article **Applies to:** - [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -[!include[Prerelease information](prerelease.md)] The threat protection report provides high-level information about alerts generated in your organization. The report includes trending information showing the detection sources, categories, severities, statuses, classifications, and determinations of alerts across time. diff --git a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md index 450fdcb9a5..a125e6e506 100644 --- a/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md +++ b/windows/security/threat-protection/windows-defender-atp/whats-new-in-windows-defender-atp.md @@ -23,6 +23,15 @@ ms.topic: conceptual Here are the new features in the latest release of Windows Defender ATP as well as security features in Windows 10 and Windows Server. +## May 2019 +The following capability is generally available (GA). + +- [Threat protection reports](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection)
The threat protection report provides high-level information about alerts generated in your organization. + + +- [Microsoft Threat Experts](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts)
Microsoft Threat Experts is the new managed threat hunting service in Windows Defender ATP that provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It provides additional layer of expertise and optics that Microsoft customers can utilize to augment security operation capabilities as part of Microsoft 365. + + ## April 2019 The following capability is generally available (GA). @@ -51,13 +60,6 @@ The following capabilities are generally available (GA). - [Onboard previous versions of Windows](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection)
Onboard supported versions of Windows machines so that they can send sensor data to the Windows Defender ATP sensor. -### In preview -The following capability are included in the February 2019 preview release. - -- [Reports](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/threat-protection-reports-windows-defender-advanced-threat-protection)
The threat protection report provides high-level information about alerts generated in your organization. - -- [Microsoft Threat Experts](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/microsoft-threat-experts)
Microsoft Threat Experts is the new managed threat hunting service in Windows Defender ATP that provides proactive hunting, prioritization, and additional context and insights that further empower security operations centers (SOCs) to identify and respond to threats quickly and accurately. It provides additional layer of expertise and optics that Microsoft customers can utilize to augment security operation capabilities as part of Microsoft 365. - ## October 2018 The following capabilities are generally available (GA).
Home