Update defender-endpoint-false-positives-negatives.md

This commit is contained in:
Denise Vangel-MSFT
2021-01-15 14:08:28 -08:00
parent 07713c9877
commit 70896026c3

View File

@ -77,9 +77,6 @@ We recommend using Microsoft Endpoint Manager to edit your cloud-delivered prote
8. On the **Assignments** tab, specify the users and groups to whom your policy should be applied, and then choose **Next**. (If you need help with assignments, see [Assign user and device profiles in Microsoft Intune](https://docs.microsoft.com/mem/intune/configuration/device-profile-assign).) 8. On the **Assignments** tab, specify the users and groups to whom your policy should be applied, and then choose **Next**. (If you need help with assignments, see [Assign user and device profiles in Microsoft Intune](https://docs.microsoft.com/mem/intune/configuration/device-profile-assign).)
9. On the **Review + create** tab, review the settings, and then choose **Create**. 9. On the **Review + create** tab, review the settings, and then choose **Create**.
### Remediation for potentially unwanted applications (PUA) ### Remediation for potentially unwanted applications (PUA)
Potentially unwanted applications (PUA) are a category of software that can cause devices to run slowly, display unexpected ads, or install other software that might be unexpected or unwanted. Examples of PUA include advertising software, bundling software, and evasion software that behaves differently with security products. Although PUA is not considered malware, some kinds of software are PUA based on their behavior and reputation. Potentially unwanted applications (PUA) are a category of software that can cause devices to run slowly, display unexpected ads, or install other software that might be unexpected or unwanted. Examples of PUA include advertising software, bundling software, and evasion software that behaves differently with security products. Although PUA is not considered malware, some kinds of software are PUA based on their behavior and reputation.
@ -175,6 +172,8 @@ As alerts are triggered, if you see something that was detected as malicious or
### Suppress an alert ### Suppress an alert
You can suppress an alert in the Microsoft Defender Security Center.
### Classify an alert as a false positive ### Classify an alert as a false positive