Merged PR 2937: Merge wdeg to master

minor update to make image show
This commit is contained in:
Iaan D'Souza-Wiltshire 2017-08-30 17:44:55 +00:00
commit 7b68ab315f
11 changed files with 13 additions and 14 deletions

View File

@ -1,5 +1,5 @@
--- ---
title: Test how Windows Defender EG features will work in your organization title: Test how Windows Defender EG features work
description: Audit mode lets you use the event log to see how Windows Defender Exploit Guard would protect your devices if it were enabled description: Audit mode lets you use the event log to see how Windows Defender Exploit Guard would protect your devices if it were enabled
keywords: exploit guard, audit, auditing, mode, enabled, disabled, test, demo, evaluate, lab keywords: exploit guard, audit, auditing, mode, enabled, disabled, test, demo, evaluate, lab
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh

View File

@ -1,6 +1,6 @@
--- ---
title: Prevent ransomware and other threats from encrypting and changing important files title: Help prevent ransomware and threats from encrypting and changing files
description: Files in default folders, such as Documents and Desktop, can be protected from being changed by malicious apps. This can help prevent ransomware encrypting your files. description: Files in default folders can be protected from being changed by malicious apps. This can help prevent ransomware encrypting your files.
keywords: controlled folder access, windows 10, windows defender, ransomware, protect, files, folders keywords: controlled folder access, windows 10, windows defender, ransomware, protect, files, folders
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.pagetype: security ms.pagetype: security

View File

@ -1,5 +1,5 @@
--- ---
title: Configure how ASR works so you can finetune the protection in your network title: Configure how ASR works to finetune protection in your network
description: You can individually set rules in audit, block, or disabled modes, and add files and folders that should be excluded from ASR description: You can individually set rules in audit, block, or disabled modes, and add files and folders that should be excluded from ASR
keywords: Attack Surface Reduction, hips, host intrusion prevention system, protection rules, anti-exploit, antiexploit, exploit, infection prevention, customize, configure, exclude keywords: Attack Surface Reduction, hips, host intrusion prevention system, protection rules, anti-exploit, antiexploit, exploit, infection prevention, customize, configure, exclude
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh

View File

@ -77,8 +77,7 @@ For further details on how audit mode works, and when you might want to use it,
- **Disable (Default)** - The Controlled Folder Access feature will not work. All apps can make changes to files in protected folders. - **Disable (Default)** - The Controlled Folder Access feature will not work. All apps can make changes to files in protected folders.
- **Audit Mode** - If a malicious or suspicious app attempts to make a change to a file in a protected folder, the change will be allowed but will be recorded in the Windows event log. This allows you to assess the impact of this feature on your organization. - **Audit Mode** - If a malicious or suspicious app attempts to make a change to a file in a protected folder, the change will be allowed but will be recorded in the Windows event log. This allows you to assess the impact of this feature on your organization.
![](images/cfa-gp-enable.png)
![](images/cfa-gp-enable.png)
>[!IMPORTANT] >[!IMPORTANT]
>To fully enable the Controlled Folder Access feature, you must set the Group Policy option to **Enabled** and also select **Enable** in the options drop-down menu. >To fully enable the Controlled Folder Access feature, you must set the Group Policy option to **Enabled** and also select **Enable** in the options drop-down menu.

View File

@ -1,5 +1,5 @@
--- ---
title: Use a demo tool to see how ASR could help protect your organization's devices title: Use a demo to see how ASR can help protect your devices
description: The custom demo tool lets you create sample malware infection scenarios so you can see how ASR would block and prevent attacks description: The custom demo tool lets you create sample malware infection scenarios so you can see how ASR would block and prevent attacks
keywords: Attack Surface Reduction, hips, host intrusion prevention system, protection rules, anti-exploit, antiexploit, exploit, infection prevention, evaluate, test, demo keywords: Attack Surface Reduction, hips, host intrusion prevention system, protection rules, anti-exploit, antiexploit, exploit, infection prevention, evaluate, test, demo
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh

View File

@ -1,5 +1,5 @@
--- ---
title: See how Windows 10 can protect your files from being changed by malicious apps title: See how CFA can help protect files from being changed by malicious apps
description: Use a custom tool to see how Controlled Folder Access works in Windows 10. description: Use a custom tool to see how Controlled Folder Access works in Windows 10.
keywords: controlled folder access, windows 10, windows defender, ransomware, protect, evaluate, test, demo, try keywords: controlled folder access, windows 10, windows defender, ransomware, protect, evaluate, test, demo, try
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh

View File

@ -1,5 +1,5 @@
--- ---
title: Evaluate the impact of each of the four features in Windows Defender Exploit Guard title: Evaluate the impact of Windows Defender Exploit Guard
description: Use our evaluation guides to quickly enable and configure features, and test them against common attack scenarios description: Use our evaluation guides to quickly enable and configure features, and test them against common attack scenarios
keywords: evaluate, guides, evaluation, exploit guard, controlled folder access, attack surface reduction, exploit protection, network protection, test, demo keywords: evaluate, guides, evaluation, exploit guard, controlled folder access, attack surface reduction, exploit protection, network protection, test, demo
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh

View File

@ -1,5 +1,5 @@
--- ---
title: Import custom views in XML to see Windows Defender Exploit Guard events title: Import custom views to see Windows Defender Exploit Guard events
description: Use Windows Event Viewer to import individual views for each of the features. description: Use Windows Event Viewer to import individual views for each of the features.
keywords: event view, exploit guard, audit, review, events keywords: event view, exploit guard, audit, review, events
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh

View File

@ -1,5 +1,5 @@
--- ---
title: Apply mitigations that help prevent attacks that use vulnerabilities in software title: Apply mitigations to help prevent attacks through vulnerabilities
keywords: mitigations, vulnerabilities, vulnerability, mitigation, exploit, exploits, emet keywords: mitigations, vulnerabilities, vulnerability, mitigation, exploit, exploits, emet
description: Exploit Protection in Windows 10 provides advanced configuration over the settings offered in EMET. description: Exploit Protection in Windows 10 provides advanced configuration over the settings offered in EMET.
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh

View File

@ -1,5 +1,5 @@
--- ---
title: Use Network Protection to prevent connections to suspicious domains title: Use Network Protection to help prevent connections to bad sites
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
keywords: Network Protection, exploits, malicious website, ip, domain, domains keywords: Network Protection, exploits, malicious website, ip, domain, domains
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh

View File

@ -1,6 +1,6 @@
--- ---
title: Use Windows Defender Exploit Guard to protect your corporate network title: Use Windows Defender Exploit Guard to protect your network
description: Windows Defender Exploit Guard consists of features that can protect your network from malware and threat infection, including helping to prevent ransomware encryption and exploit attacks description: Windows Defender EG employs features that help protect your network from threats, including helping prevent ransomware encryption and exploit attacks
keywords: emet, exploit guard, Controlled Folder Access, Network Protection, Exploit Protection, Attack Surface Reduction, hips, host intrusion prevention system keywords: emet, exploit guard, Controlled Folder Access, Network Protection, Exploit Protection, Attack Surface Reduction, hips, host intrusion prevention system
search.product: eADQiWindows 10XVcnh search.product: eADQiWindows 10XVcnh
ms.pagetype: security ms.pagetype: security