Merged PR 6052: 2/27 AM Publish

This commit is contained in:
Alma Jenks 2018-02-27 18:34:32 +00:00
commit 7cbe5e46cc
4 changed files with 11 additions and 9 deletions

View File

@ -108,6 +108,7 @@ Microsoft OneNote organizes curriculum and lesson plans for teachers and student
**Try this!** **Try this!**
See how a group project comes together with opportunities to interact with other students and collaborate with peers. This one works best with the digital pen, included with your Trial in a Box. See how a group project comes together with opportunities to interact with other students and collaborate with peers. This one works best with the digital pen, included with your Trial in a Box.
When you're not using the pen, just use the magnet to stick it to the left side of the screen until you need it again.
1. On the **Start** menu, click the OneNote shortcut named **Imagine Giza** to open the **Reimagine the Great Pyramid of Giza project**. 1. On the **Start** menu, click the OneNote shortcut named **Imagine Giza** to open the **Reimagine the Great Pyramid of Giza project**.
2. Take the digital pen out of the box and make notes or draw. 2. Take the digital pen out of the box and make notes or draw.
@ -121,7 +122,7 @@ See how a group project comes together with opportunities to interact with other
![OneNote To Do Tag](images/onenote_checkmark.png) ![OneNote To Do Tag](images/onenote_checkmark.png)
- The Researcher tool from the Insert tab can help find answers. - To find information without leaving OneNote, use the Researcher tool found under the Insert tab.
![OneNote Researcher](images/onenote_researcher.png) ![OneNote Researcher](images/onenote_researcher.png)
@ -153,8 +154,9 @@ Today, we'll explore a Minecraft world through the eyes of a student.
9. Explore the world by using the keys on your keyboard. 9. Explore the world by using the keys on your keyboard.
* **W** moves forward. * **W** moves forward.
* **A** moves left. * **A** moves left.
* **D** moves right. * **S** moves right.
* **S** moves backward * **D** moves backward.
10. Use your mouse as your "eyes". Just move it to look around. 10. Use your mouse as your "eyes". Just move it to look around.
11. For a bird's eye view, double-tap the SPACE BAR. Now press the SPACE BAR to fly higher. And then hold the SHIFT key to safely land. 11. For a bird's eye view, double-tap the SPACE BAR. Now press the SPACE BAR to fly higher. And then hold the SHIFT key to safely land.

Binary file not shown.

Before

Width:  |  Height:  |  Size: 7.1 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 86 KiB

View File

@ -9,8 +9,8 @@ ms.mktglfcycl: manage
ms.sitesec: library ms.sitesec: library
ms.pagetype: security ms.pagetype: security
localizationpriority: medium localizationpriority: medium
author: iaanw author: andreabichsel
ms.author: iawilt ms.author: v-anbic
ms.date: 12/12/2017 ms.date: 12/12/2017
--- ---
@ -33,10 +33,10 @@ Windows Defender Exploit Guard (Windows Defender EG) is a new set of host intrus
There are four features in Windows Defender EG: There are four features in Windows Defender EG:
- [Exploit protection](exploit-protection-exploit-guard.md) can apply exploit mitigation techniques to apps your organization uses, both individually and to all apps - [Exploit protection](exploit-protection-exploit-guard.md) can apply exploit mitigation techniques to apps your organization uses, both individually and to all apps. Works with third-party antivirus solutions and Windows Defender Antivirus (Windows Defender AV).
- [Attack surface reduction rules](attack-surface-reduction-exploit-guard.md) can reduce the attack surface of your applications with intelligent rules that stop the vectors used by Office-, script- and mail-based malware - [Attack surface reduction rules](attack-surface-reduction-exploit-guard.md) can reduce the attack surface of your applications with intelligent rules that stop the vectors used by Office-, script- and mail-based malware. Requires Windows Defender AV.
- [Network protection](network-protection-exploit-guard.md) extends the malware and social engineering protection offered by Windows Defender SmartScreen in Microsoft Edge to cover network traffic and connectivity on your organization's devices - [Network protection](network-protection-exploit-guard.md) extends the malware and social engineering protection offered by Windows Defender SmartScreen in Microsoft Edge to cover network traffic and connectivity on your organization's devices. Requires Windows Defender AV.
- [Controlled folder access](controlled-folders-exploit-guard.md) helps protect files in key system folders from changes made by malicious and suspicious apps, including file-encrypting ransomware malware - [Controlled folder access](controlled-folders-exploit-guard.md) helps protect files in key system folders from changes made by malicious and suspicious apps, including file-encrypting ransomware malware. Requires Windows Defender AV.
You can evaluate each feature of Windows Defender EG with the guides at the following link, which provide pre-built PowerShell scripts and testing tools so you can see the features in action: You can evaluate each feature of Windows Defender EG with the guides at the following link, which provide pre-built PowerShell scripts and testing tools so you can see the features in action: