mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-20 01:07:23 +00:00
Merged PR 6052: 2/27 AM Publish
This commit is contained in:
commit
7cbe5e46cc
@ -108,6 +108,7 @@ Microsoft OneNote organizes curriculum and lesson plans for teachers and student
|
||||
|
||||
**Try this!**
|
||||
See how a group project comes together with opportunities to interact with other students and collaborate with peers. This one works best with the digital pen, included with your Trial in a Box.
|
||||
When you're not using the pen, just use the magnet to stick it to the left side of the screen until you need it again.
|
||||
|
||||
1. On the **Start** menu, click the OneNote shortcut named **Imagine Giza** to open the **Reimagine the Great Pyramid of Giza project**.
|
||||
2. Take the digital pen out of the box and make notes or draw.
|
||||
@ -121,7 +122,7 @@ See how a group project comes together with opportunities to interact with other
|
||||
|
||||

|
||||
|
||||
- The Researcher tool from the Insert tab can help find answers.
|
||||
- To find information without leaving OneNote, use the Researcher tool found under the Insert tab.
|
||||
|
||||

|
||||
|
||||
@ -153,8 +154,9 @@ Today, we'll explore a Minecraft world through the eyes of a student.
|
||||
9. Explore the world by using the keys on your keyboard.
|
||||
* **W** moves forward.
|
||||
* **A** moves left.
|
||||
* **D** moves right.
|
||||
* **S** moves backward
|
||||
* **S** moves right.
|
||||
* **D** moves backward.
|
||||
|
||||
|
||||
10. Use your mouse as your "eyes". Just move it to look around.
|
||||
11. For a bird's eye view, double-tap the SPACE BAR. Now press the SPACE BAR to fly higher. And then hold the SHIFT key to safely land.
|
||||
|
Binary file not shown.
Before Width: | Height: | Size: 7.1 KiB |
BIN
education/trial-in-a-box/images/onenote_checkmark.png
Normal file
BIN
education/trial-in-a-box/images/onenote_checkmark.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 86 KiB |
@ -9,8 +9,8 @@ ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
localizationpriority: medium
|
||||
author: iaanw
|
||||
ms.author: iawilt
|
||||
author: andreabichsel
|
||||
ms.author: v-anbic
|
||||
ms.date: 12/12/2017
|
||||
---
|
||||
|
||||
@ -33,10 +33,10 @@ Windows Defender Exploit Guard (Windows Defender EG) is a new set of host intrus
|
||||
|
||||
There are four features in Windows Defender EG:
|
||||
|
||||
- [Exploit protection](exploit-protection-exploit-guard.md) can apply exploit mitigation techniques to apps your organization uses, both individually and to all apps
|
||||
- [Attack surface reduction rules](attack-surface-reduction-exploit-guard.md) can reduce the attack surface of your applications with intelligent rules that stop the vectors used by Office-, script- and mail-based malware
|
||||
- [Network protection](network-protection-exploit-guard.md) extends the malware and social engineering protection offered by Windows Defender SmartScreen in Microsoft Edge to cover network traffic and connectivity on your organization's devices
|
||||
- [Controlled folder access](controlled-folders-exploit-guard.md) helps protect files in key system folders from changes made by malicious and suspicious apps, including file-encrypting ransomware malware
|
||||
- [Exploit protection](exploit-protection-exploit-guard.md) can apply exploit mitigation techniques to apps your organization uses, both individually and to all apps. Works with third-party antivirus solutions and Windows Defender Antivirus (Windows Defender AV).
|
||||
- [Attack surface reduction rules](attack-surface-reduction-exploit-guard.md) can reduce the attack surface of your applications with intelligent rules that stop the vectors used by Office-, script- and mail-based malware. Requires Windows Defender AV.
|
||||
- [Network protection](network-protection-exploit-guard.md) extends the malware and social engineering protection offered by Windows Defender SmartScreen in Microsoft Edge to cover network traffic and connectivity on your organization's devices. Requires Windows Defender AV.
|
||||
- [Controlled folder access](controlled-folders-exploit-guard.md) helps protect files in key system folders from changes made by malicious and suspicious apps, including file-encrypting ransomware malware. Requires Windows Defender AV.
|
||||
|
||||
|
||||
You can evaluate each feature of Windows Defender EG with the guides at the following link, which provide pre-built PowerShell scripts and testing tools so you can see the features in action:
|
||||
|
Loading…
x
Reference in New Issue
Block a user