mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-20 09:17:25 +00:00
Merged PR 6052: 2/27 AM Publish
This commit is contained in:
commit
7cbe5e46cc
@ -108,6 +108,7 @@ Microsoft OneNote organizes curriculum and lesson plans for teachers and student
|
|||||||
|
|
||||||
**Try this!**
|
**Try this!**
|
||||||
See how a group project comes together with opportunities to interact with other students and collaborate with peers. This one works best with the digital pen, included with your Trial in a Box.
|
See how a group project comes together with opportunities to interact with other students and collaborate with peers. This one works best with the digital pen, included with your Trial in a Box.
|
||||||
|
When you're not using the pen, just use the magnet to stick it to the left side of the screen until you need it again.
|
||||||
|
|
||||||
1. On the **Start** menu, click the OneNote shortcut named **Imagine Giza** to open the **Reimagine the Great Pyramid of Giza project**.
|
1. On the **Start** menu, click the OneNote shortcut named **Imagine Giza** to open the **Reimagine the Great Pyramid of Giza project**.
|
||||||
2. Take the digital pen out of the box and make notes or draw.
|
2. Take the digital pen out of the box and make notes or draw.
|
||||||
@ -121,7 +122,7 @@ See how a group project comes together with opportunities to interact with other
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
- The Researcher tool from the Insert tab can help find answers.
|
- To find information without leaving OneNote, use the Researcher tool found under the Insert tab.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -153,8 +154,9 @@ Today, we'll explore a Minecraft world through the eyes of a student.
|
|||||||
9. Explore the world by using the keys on your keyboard.
|
9. Explore the world by using the keys on your keyboard.
|
||||||
* **W** moves forward.
|
* **W** moves forward.
|
||||||
* **A** moves left.
|
* **A** moves left.
|
||||||
* **D** moves right.
|
* **S** moves right.
|
||||||
* **S** moves backward
|
* **D** moves backward.
|
||||||
|
|
||||||
|
|
||||||
10. Use your mouse as your "eyes". Just move it to look around.
|
10. Use your mouse as your "eyes". Just move it to look around.
|
||||||
11. For a bird's eye view, double-tap the SPACE BAR. Now press the SPACE BAR to fly higher. And then hold the SHIFT key to safely land.
|
11. For a bird's eye view, double-tap the SPACE BAR. Now press the SPACE BAR to fly higher. And then hold the SHIFT key to safely land.
|
||||||
|
Binary file not shown.
Before Width: | Height: | Size: 7.1 KiB |
BIN
education/trial-in-a-box/images/onenote_checkmark.png
Normal file
BIN
education/trial-in-a-box/images/onenote_checkmark.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 86 KiB |
@ -9,8 +9,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
author: iaanw
|
author: andreabichsel
|
||||||
ms.author: iawilt
|
ms.author: v-anbic
|
||||||
ms.date: 12/12/2017
|
ms.date: 12/12/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -33,10 +33,10 @@ Windows Defender Exploit Guard (Windows Defender EG) is a new set of host intrus
|
|||||||
|
|
||||||
There are four features in Windows Defender EG:
|
There are four features in Windows Defender EG:
|
||||||
|
|
||||||
- [Exploit protection](exploit-protection-exploit-guard.md) can apply exploit mitigation techniques to apps your organization uses, both individually and to all apps
|
- [Exploit protection](exploit-protection-exploit-guard.md) can apply exploit mitigation techniques to apps your organization uses, both individually and to all apps. Works with third-party antivirus solutions and Windows Defender Antivirus (Windows Defender AV).
|
||||||
- [Attack surface reduction rules](attack-surface-reduction-exploit-guard.md) can reduce the attack surface of your applications with intelligent rules that stop the vectors used by Office-, script- and mail-based malware
|
- [Attack surface reduction rules](attack-surface-reduction-exploit-guard.md) can reduce the attack surface of your applications with intelligent rules that stop the vectors used by Office-, script- and mail-based malware. Requires Windows Defender AV.
|
||||||
- [Network protection](network-protection-exploit-guard.md) extends the malware and social engineering protection offered by Windows Defender SmartScreen in Microsoft Edge to cover network traffic and connectivity on your organization's devices
|
- [Network protection](network-protection-exploit-guard.md) extends the malware and social engineering protection offered by Windows Defender SmartScreen in Microsoft Edge to cover network traffic and connectivity on your organization's devices. Requires Windows Defender AV.
|
||||||
- [Controlled folder access](controlled-folders-exploit-guard.md) helps protect files in key system folders from changes made by malicious and suspicious apps, including file-encrypting ransomware malware
|
- [Controlled folder access](controlled-folders-exploit-guard.md) helps protect files in key system folders from changes made by malicious and suspicious apps, including file-encrypting ransomware malware. Requires Windows Defender AV.
|
||||||
|
|
||||||
|
|
||||||
You can evaluate each feature of Windows Defender EG with the guides at the following link, which provide pre-built PowerShell scripts and testing tools so you can see the features in action:
|
You can evaluate each feature of Windows Defender EG with the guides at the following link, which provide pre-built PowerShell scripts and testing tools so you can see the features in action:
|
||||||
|
Loading…
x
Reference in New Issue
Block a user