From 746fb05daf979a2fe4e4fe10e12dfb82649560e6 Mon Sep 17 00:00:00 2001 From: iaanw Date: Wed, 8 Feb 2017 15:49:06 -0800 Subject: [PATCH] test toc --- windows/keep-secure/TOC.md | 124 ++++++++++++++++++------------------- 1 file changed, 62 insertions(+), 62 deletions(-) diff --git a/windows/keep-secure/TOC.md b/windows/keep-secure/TOC.md index 72c4e125b5..41cf816669 100644 --- a/windows/keep-secure/TOC.md +++ b/windows/keep-secure/TOC.md @@ -757,68 +757,68 @@ #### [Run a Windows Defender scan from the command line](run-cmd-scan-windows-defender-for-windows-10.md) #### [Detect and block Potentially Unwanted Applications with Windows Defender](enable-pua-windows-defender-for-windows-10.md) #### [Troubleshoot Windows Defender in Windows 10](troubleshoot-windows-defender-in-windows-10.md) -### [Windows Defender Antivirus] -#### [Requirements for Windows Defender Antivirus] -#### [Data collection and privacy in Windows Defender Antivirus] -#### [Evaluate Windows Defender Antivirus protection] -##### [Evaluation Guide for Windows Defender Antivirus] -#### [Deploy, manage, and report on Windows Defender Antivirus] -##### [Deploy WDAM from a managed Windows 10 endpoint] -###### [Use Azure Active Directory and group policy to deploy Windows Defender Antivirus] -###### [Use System Center Configuration Manager to deploy Windows Defender Antivirus] -###### [Use Windows Management Instrumentation (WMI) and PowerShell to deploy Windows Defender Antivirus] -###### [Use Intune to to deploy Windows Defender Antivirus] -##### [Report on Windows Defender Antivirus protection] -###### [Use Microsoft Operations Management Suite to monitor Windows Defender Antivirus] -###### [Use System Center Configuration Manager to monitor Windows Defender Antivirus] -###### [Use Azure Active Directory to monitor Windows Defender Antivirus] -###### [Use the Windows Defender App to monitor Windows Defender Antivirus] -##### [Use the Integrated threat protection management system (8227874)] -##### [Manage end-user interaction with WDAM] -###### [Configure the types of notifications that end-users see] -###### [Prevent users from seeing or interacting with the WDAM user interface] -###### [Prevent users from modifying cloud protection features] -###### [Prevent users from modifying scan settings] -#### [Configure Windows Defender features] -##### [Configure update options for Windows Defender Anti-Malware] -###### [Configure endpoint product updates] -###### [Configure protection (definition) updates] -####### [Definition update logic] -####### [Update WDAM protection with AAD, SCCM, or Intune] -##### [Utilize Microsoft cloud protection] -###### [Enable cloud protection] -####### [Specify the cloud protection level for WDAM] -####### [Configure network connections for cloud protection] -###### [Configure the cloud block timeout period] -###### [Configure the block at first sight feature] -##### [Configure behavioral, heuristic, and real-time protection] -###### [Detect and block potentially unwanted software] -###### [Use behavioral, heuristic, and real-time protection] -##### [Security profiles] -#### [Customize and initiate scans] -##### [Customize scanning options] -###### [Exclude files and processes from scans] -###### [Configure email, removable storage, network, reparse point, and archive scanning] -###### [Configure remediation for scans] -##### [Initiate and review the results of scans] -###### [Schedule scans] -###### [Run an on-demand scan] -###### [Run a scan from the command line] -###### [Run and review the results of a Windows Defender Offline scan] -#### [Troubleshoot Windows Defender Antivirus issues] -##### [WDAM client event IDs] -##### [WDAM client error codes] -##### [Resolving endpoint remediation issues] -##### [Decision tree for troubleshooting various issues] -#### [Reference topics] -##### [Sample configuration policies] -###### [ADM, ADMX, and GPO templates] -###### [Sample Intune policies] -###### [Sample SCCM policies] -##### [WMI classes] -##### [Use PowerShell cmdlets for Windows Defender Antivirus] -##### [Command line arguments] -##### [The TAP program] +### Windows Defender Antivirus +#### Requirements for Windows Defender Antivirus +#### Data collection and privacy in Windows Defender Antivirus +#### Evaluate Windows Defender Antivirus protection +##### Evaluation Guide for Windows Defender Antivirus +#### Deploy, manage, and report on Windows Defender Antivirus +##### Deploy WDAM from a managed Windows 10 endpoint +###### Use Azure Active Directory and group policy to deploy Windows Defender Antivirus +###### Use System Center Configuration Manager to deploy Windows Defender Antivirus +###### Use Windows Management Instrumentation (WMI) and PowerShell to deploy Windows Defender Antivirus +###### Use Intune to to deploy Windows Defender Antivirus +##### Report on Windows Defender Antivirus protection +###### Use Microsoft Operations Management Suite to monitor Windows Defender Antivirus +###### Use System Center Configuration Manager to monitor Windows Defender Antivirus +###### Use Azure Active Directory to monitor Windows Defender Antivirus +###### Use the Windows Defender App to monitor Windows Defender Antivirus +##### Use the Integrated threat protection management system (8227874) +##### Manage end-user interaction with WDAM +###### Configure the types of notifications that end-users see +###### Prevent users from seeing or interacting with the WDAM user interface +###### Prevent users from modifying cloud protection features +###### Prevent users from modifying scan settings +#### Configure Windows Defender features +##### Configure update options for Windows Defender Anti-Malware +###### Configure endpoint product updates +###### Configure protection (definition) updates +####### Definition update logic +####### Update WDAM protection with AAD, SCCM, or Intune +##### Utilize Microsoft cloud protection +###### Enable cloud protection +####### Specify the cloud protection level for WDAM +####### Configure network connections for cloud protection +###### Configure the cloud block timeout period +###### Configure the block at first sight feature +##### Configure behavioral, heuristic, and real-time protection +###### Detect and block potentially unwanted software +###### Use behavioral, heuristic, and real-time protection +##### Security profiles +#### Customize and initiate scans +##### Customize scanning options +###### Exclude files and processes from scans +###### Configure email, removable storage, network, reparse point, and archive scanning +###### Configure remediation for scans +##### Initiate and review the results of scans +###### Schedule scans +###### Run an on-demand scan +###### Run a scan from the command line +###### Run and review the results of a Windows Defender Offline scan +#### Troubleshoot Windows Defender Antivirus issues +##### WDAM client event IDs +##### WDAM client error codes +##### Resolving endpoint remediation issues +##### Decision tree for troubleshooting various issues +#### Reference topics +##### Sample configuration policies +###### ADM, ADMX, and GPO templates +###### Sample Intune policies +###### Sample SCCM policies +##### WMI classes +##### Use PowerShell cmdlets for Windows Defender Antivirus +##### Command line arguments +##### The TAP program ### [Windows Firewall with Advanced Security](windows-firewall-with-advanced-security.md) #### [Isolating Windows Store Apps on Your Network](isolating-apps-on-your-network.md)