From 7947a088cb46c7e8e27e5437cce0381603a02c71 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 11:12:48 -0800 Subject: [PATCH 01/22] ATP for Mac updates --- .../threat-protection/microsoft-defender-atp/preview.md | 4 +--- .../whats-new-in-microsoft-defender-atp.md | 2 +- 2 files changed, 2 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/preview.md b/windows/security/threat-protection/microsoft-defender-atp/preview.md index 99475c18be..7173007d17 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/preview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/preview.md @@ -42,9 +42,7 @@ Turn on the preview experience setting to be among the first to try upcoming fea ## Preview features The following features are included in the preview release: -- [Endpoint detection and response for Mac devices](endpoint-detection-response-mac-preview.md). Recently, [Microsoft Defender ATP for Mac](microsoft-defender-atp-mac.md) released. Expanding on the protection available in Microsoft Defender ATP for Mac, endpoint detection and response capabilities are now in preview. - - - [Threat & Vulnerability supported operating systems and platforms](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-supported-os)
Ensure that you meet the operating system or platform requisites for Threat & Vulnerability Management so the activities in your devices are properly accounted for. Threat & Vulnerability Management supports Windows 7, Windows 10 1607-1703, Windows 10 1709+, Windows Server 2008R2, Windows Server 2012R2, Windows Server 2016, Windows Server 2019. + - [Threat & Vulnerability supported operating systems and platforms](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-supported-os)
Ensure that you meet the operating system or platform requisites for Threat & Vulnerability Management so the activities in your devices are properly accounted for. Threat & Vulnerability Management supports Windows 7, Windows 10 1607-1703, Windows 10 1709+, Windows Server 2008 R2, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019. - [Threat & Vulnerability Management Report inaccuracy](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation#report-inaccuracy)
You can report a false positive when you see any vague, inaccurate, incomplete, or already remediated [security recommendation](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation#report-inaccuracy), [software inventory](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-software-inventory#report-inaccuracy), and [discovered vulnerabilities](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-weaknesses#report-inaccuracy). diff --git a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md index 2782279fcc..73d6f92070 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md @@ -29,7 +29,7 @@ For more information preview features, see [Preview features](https://docs.micro ## November 2019 -- [Microsoft Defender ATP for Mac](microsoft-defender-atp-mac.md)
Microsoft Defender ATP for Mac brings the next-generation protection to Mac devices. Core components of the unified endpoint security platform will now be available for Mac devices. ([Endpoint detection and response is currently in preview](preview.md).) +- [Microsoft Defender ATP for Mac](microsoft-defender-atp-mac.md)
Microsoft Defender ATP for Mac brings the next-generation protection to Mac devices. Core components of the unified endpoint security platform will now be available for Mac devices, including [endpoint detection and response](endpoint-detection-response-mac-preview.md). - [Threat & Vulnerability Management application end-of-life notification](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation)
Applications which have reached their end-of-life are labeled as such so you are aware that they will no longer be supported, and can take action to either uninstall or replace. Doing so will help lessen the risks related to various vulnerability exposures due to unpatched applications. From 8fc5017dbb7d4e8a702dc829b3ed73901021f48c Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 11:13:51 -0800 Subject: [PATCH 02/22] Update mac-preferences.md --- .../microsoft-defender-atp/mac-preferences.md | 34 +++++++++++++++++++ 1 file changed, 34 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md index 0d0904ba75..f0f9483449 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md @@ -283,6 +283,40 @@ Whether EDR early preview features are enabled or not. | **Data type** | Boolean | | **Possible values** | true (default)
false | +#### Device tags + +Specify the tag name and its desired value, Current supported tags:Group - allows to set machine tag (reflected in the portal) + +||| +|:---|:---| +| **Domain** | com.microsoft.wdav | +| **Key** | tags | +| **Data type** | Dictionary (nested preference) | +| **Comments** | See the following sections for a description of the dictionary contents. | + +**Type of tag** + +Specifies the type of tag + +||| +|:---|:---| +| **Domain** | com.microsoft.wdav | +| **Key** | key | +| **Data type** | String | +| **Possible values** | GROUP | + +**Value of tag** + +Specifies the value of tag + +||| +|:---|:---| +| **Domain** | com.microsoft.wdav | +| **Key** | value | +| **Data type** | String | +| **Possible values** | any string | + + ## Recommended configuration profile To get started, we recommend the following configuration profile for your enterprise to take advantage of all protection features that Microsoft Defender ATP provides. From d47ac428afb0117971c5274c376a6fb59264dd46 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 11:14:31 -0800 Subject: [PATCH 03/22] Update mac-preferences.md --- .../threat-protection/microsoft-defender-atp/mac-preferences.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md index f0f9483449..231dc8bc15 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md @@ -24,7 +24,7 @@ ms.topic: conceptual - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) for Mac](microsoft-defender-atp-mac.md) >[!IMPORTANT] ->This topic contains instructions for how to set preferences for Microsoft Defender ATP for Mac in enterprise environments. If you are interested in configuring the product on a device from the command-line, please refer to the [Resources](mac-resources.md#configuring-from-the-command-line) page. +>This article contains instructions for how to set preferences for Microsoft Defender ATP for Mac in enterprise environments. If you are interested in configuring the product on a device from the command-line, please refer to the [Resources](mac-resources.md#configuring-from-the-command-line) page. In enterprise environments, Microsoft Defender ATP for Mac can be managed through a configuration profile. This profile is deployed from management tool of your choice. Preferences managed by the enterprise take precedence over the ones set locally on the device. In other words, users in your enterprise are not able to change preferences that are set through this configuration profile. From 315810ab2ceb420c09068d2356c7eb965fa2e34f Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 11:19:05 -0800 Subject: [PATCH 04/22] Update mac-preferences.md --- .../microsoft-defender-atp/mac-preferences.md | 27 ++++++++++--------- 1 file changed, 14 insertions(+), 13 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md index 231dc8bc15..637b7de5ac 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md @@ -1,6 +1,6 @@ --- title: Set preferences for Microsoft Defender ATP for Mac -description: Configure Microsoft Defender ATP for Mac in enterprises. +description: Configure Microsoft Defender ATP for Mac in enterprise organizations. keywords: microsoft, defender, atp, mac, management, preferences, enterprise, intune, jamf, macos, catalina, mojave, high sierra search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -26,9 +26,11 @@ ms.topic: conceptual >[!IMPORTANT] >This article contains instructions for how to set preferences for Microsoft Defender ATP for Mac in enterprise environments. If you are interested in configuring the product on a device from the command-line, please refer to the [Resources](mac-resources.md#configuring-from-the-command-line) page. -In enterprise environments, Microsoft Defender ATP for Mac can be managed through a configuration profile. This profile is deployed from management tool of your choice. Preferences managed by the enterprise take precedence over the ones set locally on the device. In other words, users in your enterprise are not able to change preferences that are set through this configuration profile. +In enterprise organizations, Microsoft Defender ATP for Mac can be managed through a configuration profile, and deployed by using one of several management tools. -This topic describes the structure of this profile (including a recommended profile that you can use to get started) and instructions for how to deploy the profile. +Preferences managed by the enterprise take precedence over the ones set locally on the device. In other words, users in your enterprise are not able to change preferences that are set through this configuration profile. + +This article describes the structure of this profile (including a recommended profile that you can use to get started) and instructions for how to deploy the profile. ## Configuration profile structure @@ -89,7 +91,7 @@ Entities that have been excluded from the scan. Exclusions can be specified by f | **Data type** | Dictionary (nested preference) | | **Comments** | See the following sections for a description of the dictionary contents. | -**Type of exclusion** +##### Type of exclusion Specifies the type of content excluded from the scan. @@ -100,7 +102,7 @@ Specifies the type of content excluded from the scan. | **Data type** | String | | **Possible values** | excludedPath
excludedFileExtension
excludedFileName | -**Path to excluded content** +##### Path to excluded content Used to exclude content from the scan by full file path. @@ -112,7 +114,7 @@ Used to exclude content from the scan by full file path. | **Possible values** | valid paths | | **Comments** | Applicable only if *$type* is *excludedPath* | -**Path type (file / directory)** +##### Path type (file / directory) Indicates if the *path* property refers to a file or directory. @@ -124,7 +126,7 @@ Indicates if the *path* property refers to a file or directory. | **Possible values** | false (default)
true | | **Comments** | Applicable only if *$type* is *excludedPath* | -**File extension excluded from the scan** +##### File extension excluded from the scan Used to exclude content from the scan by file extension. @@ -136,7 +138,7 @@ Used to exclude content from the scan by file extension. | **Possible values** | valid file extensions | | **Comments** | Applicable only if *$type* is *excludedFileExtension* | -**Name of excluded content** +##### Name of excluded content Used to exclude content from the scan by file name. @@ -169,7 +171,7 @@ The *threatTypeSettings* preference in the antivirus engine is used to control h | **Data type** | Dictionary (nested preference) | | **Comments** | See the following sections for a description of the dictionary contents. | -**Threat type** +##### Threat type Type of the threat for which the behavior is configured. @@ -180,7 +182,7 @@ Type of the threat for which the behavior is configured. | **Data type** | String | | **Possible values** | potentially_unwanted_application
archive_bomb | -**Action to take** +##### Action to take Action to take when coming across a threat of the type specified in the preceding section. Can be: @@ -294,7 +296,7 @@ Specify the tag name and its desired value, Current supported tags:Group - allow | **Data type** | Dictionary (nested preference) | | **Comments** | See the following sections for a description of the dictionary contents. | -**Type of tag** +##### Type of tag Specifies the type of tag @@ -305,7 +307,7 @@ Specifies the type of tag | **Data type** | String | | **Possible values** | GROUP | -**Value of tag** +##### Value of tag Specifies the value of tag @@ -316,7 +318,6 @@ Specifies the value of tag | **Data type** | String | | **Possible values** | any string | - ## Recommended configuration profile To get started, we recommend the following configuration profile for your enterprise to take advantage of all protection features that Microsoft Defender ATP provides. From 3f4f30490a844bab2188bb42b1fe67178f9db229 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 11:19:24 -0800 Subject: [PATCH 05/22] Update mac-preferences.md --- .../threat-protection/microsoft-defender-atp/mac-preferences.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md index 637b7de5ac..fdb4c00182 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md @@ -672,7 +672,7 @@ From the JAMF console, open **Computers** > **Configuration Profiles**, navigate 7. Select **Manage** > **Assignments**. In the **Include** tab, select **Assign to All Users & All devices**. >[!CAUTION] ->You must enter the correct custom configuration profile name, otherwise these preferences will not be recognized by the product. +>You must enter the correct custom configuration profile name; otherwise, these preferences will not be recognized by the product. ## Resources From 3b4bc1efb354982b95dd84fcf84f4c8a270d44e5 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 11:19:47 -0800 Subject: [PATCH 06/22] Update mac-preferences.md --- .../threat-protection/microsoft-defender-atp/mac-preferences.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md index fdb4c00182..78cf4faaed 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md @@ -653,7 +653,7 @@ Once you've built the configuration profile for your enterprise, you can deploy From the JAMF console, open **Computers** > **Configuration Profiles**, navigate to the configuration profile you'd like to use, then select **Custom Settings**. Create an entry with *com.microsoft.wdav* as the preference domain and upload the .plist produced earlier. >[!CAUTION] ->You must enter the correct preference domain (*com.microsoft.wdav*), otherwise the preferences will not be recognized by the product. +>You must enter the correct preference domain (`com.microsoft.wdav`); otherwise, the preferences will not be recognized by the product. ### Intune deployment From 60b20cbd36706df950c428838f60c8746e30a18a Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 11:20:51 -0800 Subject: [PATCH 07/22] Update mac-preferences.md --- .../microsoft-defender-atp/mac-preferences.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md index 78cf4faaed..4b408495e7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md @@ -120,7 +120,7 @@ Indicates if the *path* property refers to a file or directory. ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | isDirectory | | **Data type** | Boolean | | **Possible values** | false (default)
true | @@ -132,7 +132,7 @@ Used to exclude content from the scan by file extension. ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | extension | | **Data type** | String | | **Possible values** | valid file extensions | @@ -144,7 +144,7 @@ Used to exclude content from the scan by file name. ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | name | | **Data type** | String | | **Possible values** | any string | @@ -177,7 +177,7 @@ Type of the threat for which the behavior is configured. ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | key | | **Data type** | String | | **Possible values** | potentially_unwanted_application
archive_bomb | From 07f63ce59686be10a91e35a2215a4580aafa09b2 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 11:21:43 -0800 Subject: [PATCH 08/22] Update mac-preferences.md --- .../microsoft-defender-atp/mac-preferences.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md index 4b408495e7..0323ddee42 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md @@ -47,7 +47,7 @@ The *antivirusEngine* section of the configuration profile is used to manage the ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | antivirusEngine | | **Data type** | Dictionary (nested preference) | | **Comments** | See the following sections for a description of the dictionary contents. | @@ -58,7 +58,7 @@ Whether real-time protection (scan files as they are accessed) is enabled or not ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | enableRealTimeProtection | | **Data type** | Boolean | | **Possible values** | true (default)
false | @@ -74,7 +74,7 @@ Whether the antivirus engine runs in passive mode or not. In passive mode: ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | passiveMode | | **Data type** | Boolean | | **Possible values** | false (default)
true | @@ -86,7 +86,7 @@ Entities that have been excluded from the scan. Exclusions can be specified by f ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | exclusions | | **Data type** | Dictionary (nested preference) | | **Comments** | See the following sections for a description of the dictionary contents. | @@ -97,7 +97,7 @@ Specifies the type of content excluded from the scan. ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | $type | | **Data type** | String | | **Possible values** | excludedPath
excludedFileExtension
excludedFileName | @@ -108,7 +108,7 @@ Used to exclude content from the scan by full file path. ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | path | | **Data type** | String | | **Possible values** | valid paths | From 6e97fcd412613363587556e6656952dd317d6bdb Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 11:25:46 -0800 Subject: [PATCH 09/22] Update mac-preferences.md --- .../microsoft-defender-atp/mac-preferences.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md index 0323ddee42..0b1ce26f11 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md @@ -24,13 +24,13 @@ ms.topic: conceptual - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) for Mac](microsoft-defender-atp-mac.md) >[!IMPORTANT] ->This article contains instructions for how to set preferences for Microsoft Defender ATP for Mac in enterprise environments. If you are interested in configuring the product on a device from the command-line, please refer to the [Resources](mac-resources.md#configuring-from-the-command-line) page. +>This article contains instructions for how to set preferences for Microsoft Defender ATP for Mac in enterprise organizations. To configure Microsoft Defender ATP for Mac using the command-line interface, see the [Resources](mac-resources.md#configuring-from-the-command-line) page. In enterprise organizations, Microsoft Defender ATP for Mac can be managed through a configuration profile, and deployed by using one of several management tools. -Preferences managed by the enterprise take precedence over the ones set locally on the device. In other words, users in your enterprise are not able to change preferences that are set through this configuration profile. +Preferences managed by your security operations team take precedence over preferences that are set locally on the device. In other words, users in your organization are not able to change preferences that are set through the configuration profile. -This article describes the structure of this profile (including a recommended profile that you can use to get started) and instructions for how to deploy the profile. +This article describes the structure of the configuration profile and includes a recommended profile that you can use to get started, along with instructions on how to deploy the profile. ## Configuration profile structure From fb938c2237e1737c223f20a64753a799516523b3 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 11:32:37 -0800 Subject: [PATCH 10/22] Update mac-preferences.md --- .../microsoft-defender-atp/mac-preferences.md | 28 +++++++++---------- 1 file changed, 13 insertions(+), 15 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md index 0b1ce26f11..9facca590f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md @@ -26,9 +26,7 @@ ms.topic: conceptual >[!IMPORTANT] >This article contains instructions for how to set preferences for Microsoft Defender ATP for Mac in enterprise organizations. To configure Microsoft Defender ATP for Mac using the command-line interface, see the [Resources](mac-resources.md#configuring-from-the-command-line) page. -In enterprise organizations, Microsoft Defender ATP for Mac can be managed through a configuration profile, and deployed by using one of several management tools. - -Preferences managed by your security operations team take precedence over preferences that are set locally on the device. In other words, users in your organization are not able to change preferences that are set through the configuration profile. +In enterprise organizations, Microsoft Defender ATP for Mac can be managed through a configuration profile, and deployed by using one of several management tools. Preferences that are managed by your security operations team take precedence over preferences that are set locally on the device. This means that users in your organization are not able to change preferences that are set through the configuration profile. This article describes the structure of the configuration profile and includes a recommended profile that you can use to get started, along with instructions on how to deploy the profile. @@ -197,7 +195,7 @@ Action to take when coming across a threat of the type specified in the precedin | **Data type** | String | | **Possible values** | audit (default)
block
off | -### Cloud delivered protection preferences +### Cloud-delivered protection preferences The *cloudService* entry in the configuration profile is used to configure the cloud driven protection feature of the product. @@ -208,7 +206,7 @@ The *cloudService* entry in the configuration profile is used to configure the c | **Data type** | Dictionary (nested preference) | | **Comments** | See the following sections for a description of the dictionary contents. | -#### Enable / disable cloud delivered protection +#### Enable / disable cloud-delivered protection Whether cloud delivered protection is enabled on the device or not. To improve the security of your services, we recommend keeping this feature turned on. @@ -263,9 +261,9 @@ Whether the status menu icon (shown in the top-right corner of the screen) is hi | **Data type** | Boolean | | **Possible values** | false (default)
true | -### EDR preferences +### Endpoint detection and response preferences -The *edr* section of the configuration profile is used to manage the preferences of the EDR component of the product. +The *edr* section of the configuration profile is used to manage the preferences of the endpoint detection and response (EDR) component of Microsoft Defender ATP for Mac. ||| |:---|:---| @@ -291,7 +289,7 @@ Specify the tag name and its desired value, Current supported tags:Group - allow ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | tags | | **Data type** | Dictionary (nested preference) | | **Comments** | See the following sections for a description of the dictionary contents. | @@ -302,7 +300,7 @@ Specifies the type of tag ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | key | | **Data type** | String | | **Possible values** | GROUP | @@ -313,7 +311,7 @@ Specifies the value of tag ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | value | | **Data type** | String | | **Possible values** | any string | @@ -327,7 +325,7 @@ The following configuration profile will: - Specify how the following threat types are handled: - **Potentially unwanted applications (PUA)** are blocked - **Archive bombs** (file with a high compression rate) are audited to the product logs -- Enable cloud delivered protection +- Enable cloud-delivered protection - Enable automatic sample submission ### JAMF profile @@ -650,7 +648,7 @@ Once you've built the configuration profile for your enterprise, you can deploy ### JAMF deployment -From the JAMF console, open **Computers** > **Configuration Profiles**, navigate to the configuration profile you'd like to use, then select **Custom Settings**. Create an entry with *com.microsoft.wdav* as the preference domain and upload the .plist produced earlier. +From the JAMF console, open **Computers** > **Configuration Profiles**, navigate to the configuration profile you'd like to use, then select **Custom Settings**. Create an entry with `com.microsoft.wdav` as the preference domain and upload the .plist produced earlier. >[!CAUTION] >You must enter the correct preference domain (`com.microsoft.wdav`); otherwise, the preferences will not be recognized by the product. @@ -661,11 +659,11 @@ From the JAMF console, open **Computers** > **Configuration Profiles**, navigate 2. Choose a name for the profile. Change **Platform=macOS** to **Profile type=Custom**. Select Configure. -3. Save the .plist produced earlier as **com.microsoft.wdav.xml**. +3. Save the .plist produced earlier as `com.microsoft.wdav.xml`. -4. Enter **com.microsoft.wdav** as the **custom configuration profile name**. +4. Enter `com.microsoft.wdav` as the **custom configuration profile name**. -5. Open the configuration profile and upload **com.microsoft.wdav.xml**. This file was created in step 3. +5. Open the configuration profile and upload the `com.microsoft.wdav.xml` file. (This file was created in step 3.) 6. Select **OK**. From f5a01c0e7080b56f0c62cc44bb53f61e4928e863 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 11:34:34 -0800 Subject: [PATCH 11/22] Update mac-preferences.md --- .../microsoft-defender-atp/mac-preferences.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md index 9facca590f..ae1408a475 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md @@ -26,9 +26,11 @@ ms.topic: conceptual >[!IMPORTANT] >This article contains instructions for how to set preferences for Microsoft Defender ATP for Mac in enterprise organizations. To configure Microsoft Defender ATP for Mac using the command-line interface, see the [Resources](mac-resources.md#configuring-from-the-command-line) page. -In enterprise organizations, Microsoft Defender ATP for Mac can be managed through a configuration profile, and deployed by using one of several management tools. Preferences that are managed by your security operations team take precedence over preferences that are set locally on the device. This means that users in your organization are not able to change preferences that are set through the configuration profile. +## Summary -This article describes the structure of the configuration profile and includes a recommended profile that you can use to get started, along with instructions on how to deploy the profile. +In enterprise organizations, Microsoft Defender ATP for Mac can be managed through a configuration profile that is deployed by using one of several management tools. Preferences that are managed by your security operations team take precedence over preferences that are set locally on the device. This means that users in your organization are not able to change preferences that are set through the configuration profile. + +This article describes the structure of the configuration profile, includes a recommended profile that you can use to get started, and provides instructions on how to deploy the profile. ## Configuration profile structure From 924b78bb7fd1f89366577e084c27fe4e8495b8b6 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 11:35:36 -0800 Subject: [PATCH 12/22] Update mac-preferences.md --- .../threat-protection/microsoft-defender-atp/mac-preferences.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md index ae1408a475..46e4f3d98a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md @@ -28,7 +28,7 @@ ms.topic: conceptual ## Summary -In enterprise organizations, Microsoft Defender ATP for Mac can be managed through a configuration profile that is deployed by using one of several management tools. Preferences that are managed by your security operations team take precedence over preferences that are set locally on the device. This means that users in your organization are not able to change preferences that are set through the configuration profile. +In enterprise organizations, Microsoft Defender ATP for Mac can be managed through a configuration profile that is deployed by using one of several management tools. Preferences that are managed by your security operations team take precedence over preferences that are set locally on the device. Users in your organization are not able to change preferences that are set through the configuration profile. This article describes the structure of the configuration profile, includes a recommended profile that you can use to get started, and provides instructions on how to deploy the profile. From 1d72e5f6f2899911be354b0035e90afcbc24d950 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 11:52:38 -0800 Subject: [PATCH 13/22] Update mac-preferences.md --- .../microsoft-defender-atp/mac-preferences.md | 62 +++++++++---------- 1 file changed, 31 insertions(+), 31 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md index 46e4f3d98a..30add8cdec 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md @@ -34,7 +34,7 @@ This article describes the structure of the configuration profile, includes a re ## Configuration profile structure -The configuration profile is a .plist file that consists of entries identified by a key (which denotes the name of the preference), followed by a value, which depends on the nature of the preference. Values can either be simple (such as a numerical value) or complex, such as a nested list of preferences. +The configuration profile is a *.plist* file that consists of entries identified by a key (which denotes the name of the preference), followed by a value, which depends on the nature of the preference. Values can either be simple (such as a numerical value) or complex, such as a nested list of preferences. >[!CAUTION] >The layout of the configuration profile depends on the management console that you are using. The following sections contain examples of configuration profiles for JAMF and Intune. @@ -54,7 +54,7 @@ The *antivirusEngine* section of the configuration profile is used to manage the #### Enable / disable real-time protection -Whether real-time protection (scan files as they are accessed) is enabled or not. +Specify whether to enable real-time protection, which scans files as they are accessed. ||| |:---|:---| @@ -65,7 +65,7 @@ Whether real-time protection (scan files as they are accessed) is enabled or not #### Enable / disable passive mode -Whether the antivirus engine runs in passive mode or not. In passive mode: +Specify whether the antivirus engine runs in passive mode. Passive mode has the following implications: - Real-time protection is turned off - On-demand scanning is turned on - Automatic threat remediation is turned off @@ -82,7 +82,7 @@ Whether the antivirus engine runs in passive mode or not. In passive mode: #### Scan exclusions -Entities that have been excluded from the scan. Exclusions can be specified by full paths, extensions, or file names. +Specify entities excluded from being scanned. Exclusions can be specified by full paths, extensions, or file names. ||| |:---|:---| @@ -93,7 +93,7 @@ Entities that have been excluded from the scan. Exclusions can be specified by f ##### Type of exclusion -Specifies the type of content excluded from the scan. +Specify content excluded from being scanned by type. ||| |:---|:---| @@ -104,7 +104,7 @@ Specifies the type of content excluded from the scan. ##### Path to excluded content -Used to exclude content from the scan by full file path. +Specify content excluded from being scanned by full file path. ||| |:---|:---| @@ -116,7 +116,7 @@ Used to exclude content from the scan by full file path. ##### Path type (file / directory) -Indicates if the *path* property refers to a file or directory. +Indicate if the *path* property refers to a file or directory. ||| |:---|:---| @@ -128,7 +128,7 @@ Indicates if the *path* property refers to a file or directory. ##### File extension excluded from the scan -Used to exclude content from the scan by file extension. +Specify content excluded from being scanned by file extension. ||| |:---|:---| @@ -140,7 +140,7 @@ Used to exclude content from the scan by file extension. ##### Name of excluded content -Used to exclude content from the scan by file name. +Specify content excluded from being scanned by file name. ||| |:---|:---| @@ -152,28 +152,28 @@ Used to exclude content from the scan by file name. #### Allowed threats -List of threats (identified by their name) that are not blocked by the product and are instead allowed to run. +Specify threats by name that are not blocked by Microsoft Defender ATP for Mac. These threats will be allowed to run. ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | allowedThreats | | **Data type** | Array of strings | #### Threat type settings -The *threatTypeSettings* preference in the antivirus engine is used to control how certain threat types are handled by the product. +Specify how certain threat types are handled by Microsoft Defender ATP for Mac. ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | threatTypeSettings | | **Data type** | Dictionary (nested preference) | | **Comments** | See the following sections for a description of the dictionary contents. | ##### Threat type -Type of the threat for which the behavior is configured. +Specify threat types. ||| |:---|:---| @@ -184,7 +184,7 @@ Type of the threat for which the behavior is configured. ##### Action to take -Action to take when coming across a threat of the type specified in the preceding section. Can be: +Specify what action to take when a threat of the type specified in the preceding section is detected. Choose from the following options: - **Audit**: your device is not protected against this type of threat, but an entry about the threat is logged. - **Block**: your device is protected against this type of threat and you are notified in the user interface and the security console. @@ -192,29 +192,29 @@ Action to take when coming across a threat of the type specified in the precedin ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | value | | **Data type** | String | | **Possible values** | audit (default)
block
off | ### Cloud-delivered protection preferences -The *cloudService* entry in the configuration profile is used to configure the cloud driven protection feature of the product. +Configure the cloud-driven protection features of Microsoft Defender ATP for Mac. ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | cloudService | | **Data type** | Dictionary (nested preference) | | **Comments** | See the following sections for a description of the dictionary contents. | #### Enable / disable cloud-delivered protection -Whether cloud delivered protection is enabled on the device or not. To improve the security of your services, we recommend keeping this feature turned on. +Specify whether to enable cloud-delivered protection the device or not. To improve the security of your services, we recommend keeping this feature turned on. ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | enabled | | **Data type** | Boolean | | **Possible values** | true (default)
false | @@ -236,58 +236,58 @@ Determines whether suspicious samples (that are likely to contain threats) are s ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | automaticSampleSubmission | | **Data type** | Boolean | | **Possible values** | true (default)
false | ### User interface preferences -The *userInterface* section of the configuration profile is used to manage the preferences of the user interface of the product. +Manage the preferences for the user interface of Microsoft Defender ATP for Mac. ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | userInterface | | **Data type** | Dictionary (nested preference) | | **Comments** | See the following sections for a description of the dictionary contents. | #### Show / hide status menu icon -Whether the status menu icon (shown in the top-right corner of the screen) is hidden or not. +Specify whether to show or hide the status menu icon in the top-right corner of the screen. ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | hideStatusMenuIcon | | **Data type** | Boolean | | **Possible values** | false (default)
true | ### Endpoint detection and response preferences -The *edr* section of the configuration profile is used to manage the preferences of the endpoint detection and response (EDR) component of Microsoft Defender ATP for Mac. +Manage the preferences of the endpoint detection and response (EDR) component of Microsoft Defender ATP for Mac. ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | edr | | **Data type** | Dictionary (nested preference) | | **Comments** | See the following sections for a description of the dictionary contents. | #### Enable / disable early preview -Whether EDR early preview features are enabled or not. +Specify whether to enable EDR early preview features. ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | earlyPreview | | **Data type** | Boolean | | **Possible values** | true (default)
false | #### Device tags -Specify the tag name and its desired value, Current supported tags:Group - allows to set machine tag (reflected in the portal) +Specify a tag name and its value. ||| |:---|:---| @@ -305,7 +305,7 @@ Specifies the type of tag | **Domain** | `com.microsoft.wdav` | | **Key** | key | | **Data type** | String | -| **Possible values** | GROUP | +| **Possible values** | `GROUP` | ##### Value of tag From 2fe29344b31f7abaeb16f17dd9054dafab169dfd Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 11:55:26 -0800 Subject: [PATCH 14/22] Update mac-preferences.md --- .../microsoft-defender-atp/mac-preferences.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md index 30add8cdec..2481682ec7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md @@ -39,11 +39,11 @@ The configuration profile is a *.plist* file that consists of entries identified >[!CAUTION] >The layout of the configuration profile depends on the management console that you are using. The following sections contain examples of configuration profiles for JAMF and Intune. -The top level of the configuration profile includes product-wide preferences and entries for subareas of the product, which are explained in more detail in the next sections. +The top level of the configuration profile includes product-wide preferences and entries for subareas of Microsoft Defender ATP, which are explained in more detail in the next sections. ### Antivirus engine preferences -The *antivirusEngine* section of the configuration profile is used to manage the preferences of the antivirus component of the product. +The *antivirusEngine* section of the configuration profile is used to manage the preferences of the antivirus component of Microsoft Defender ATP. ||| |:---|:---| @@ -221,7 +221,7 @@ Specify whether to enable cloud-delivered protection the device or not. To impro #### Diagnostic collection level -Diagnostic data is used to keep Microsoft Defender ATP secure and up-to-date, detect, diagnose and fix problems, and also make product improvements. This setting determines the level of diagnostics sent by the product to Microsoft. +Diagnostic data is used to keep Microsoft Defender ATP secure and up-to-date, detect, diagnose and fix problems, and also make product improvements. This setting determines the level of diagnostics sent by Microsoft Defender ATP to Microsoft. ||| |:---|:---| @@ -326,7 +326,7 @@ The following configuration profile will: - Enable real-time protection (RTP) - Specify how the following threat types are handled: - **Potentially unwanted applications (PUA)** are blocked - - **Archive bombs** (file with a high compression rate) are audited to the product logs + - **Archive bombs** (file with a high compression rate) are audited to Microsoft Defender ATP logs - Enable cloud-delivered protection - Enable automatic sample submission @@ -449,7 +449,7 @@ The following configuration profile will: ## Full configuration profile example -The following configuration profile contains entries for all settings described in this document and can be used for more advanced scenarios where you want more control over the product. +The following configuration profile contains entries for all settings described in this document and can be used for more advanced scenarios where you want more control over Microsoft Defender ATP for Mac. ### JAMF profile @@ -653,7 +653,7 @@ Once you've built the configuration profile for your enterprise, you can deploy From the JAMF console, open **Computers** > **Configuration Profiles**, navigate to the configuration profile you'd like to use, then select **Custom Settings**. Create an entry with `com.microsoft.wdav` as the preference domain and upload the .plist produced earlier. >[!CAUTION] ->You must enter the correct preference domain (`com.microsoft.wdav`); otherwise, the preferences will not be recognized by the product. +>You must enter the correct preference domain (`com.microsoft.wdav`); otherwise, the preferences will not be recognized by Microsoft Defender ATP. ### Intune deployment @@ -672,7 +672,7 @@ From the JAMF console, open **Computers** > **Configuration Profiles**, navigate 7. Select **Manage** > **Assignments**. In the **Include** tab, select **Assign to All Users & All devices**. >[!CAUTION] ->You must enter the correct custom configuration profile name; otherwise, these preferences will not be recognized by the product. +>You must enter the correct custom configuration profile name; otherwise, these preferences will not be recognized by Microsoft Defender ATP. ## Resources From 4e9d135e2264e57f9ff2ea6e4ce1acf35884c47a Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 12:03:10 -0800 Subject: [PATCH 15/22] Update iexpress-command-line-options.md --- .../ie11-ieak/iexpress-command-line-options.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/browsers/internet-explorer/ie11-ieak/iexpress-command-line-options.md b/browsers/internet-explorer/ie11-ieak/iexpress-command-line-options.md index 88e151583a..54f7c5ab5e 100644 --- a/browsers/internet-explorer/ie11-ieak/iexpress-command-line-options.md +++ b/browsers/internet-explorer/ie11-ieak/iexpress-command-line-options.md @@ -18,7 +18,7 @@ ms.date: 07/27/2017 **Applies to:** - Windows Server 2008 R2 with SP1 -# IExpress Wizard command-line options +## IExpress Wizard command-line options Use command-line options with the IExpress Wizard (IExpress.exe) to control your Internet Explorer custom browser package extraction process. These command-line options work with IExpress:
From 235daa3e7e07d63b78ef89fd249426bd03626c14 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 12:04:26 -0800 Subject: [PATCH 16/22] Update how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-a-specific-user.md --- ...pp-v-50-package-to-an-app-v-46-package-for-a-specific-user.md | 1 + 1 file changed, 1 insertion(+) diff --git a/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-a-specific-user.md b/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-a-specific-user.md index c290148b0d..76656d39e1 100644 --- a/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-a-specific-user.md +++ b/mdop/appv-v5/how-to-revert-extension-points-from-an-app-v-50-package-to-an-app-v-46-package-for-a-specific-user.md @@ -1,3 +1,4 @@ +--- ms.reviewer: title: How to Revert Extension Points From an App-V 5.0 Package to an App-V 4.6 Package for a Specific User description: How to Revert Extension Points From an App-V 5.0 Package to an App-V 4.6 Package for a Specific User From c84728ed1b80554f95122d0bf9b3d63516b87b34 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 12:04:58 -0800 Subject: [PATCH 17/22] Update how-to-use-an-app-v-46-sp1-application-from-an-app-v-50-application.md --- ...e-an-app-v-46-sp1-application-from-an-app-v-50-application.md | 1 + 1 file changed, 1 insertion(+) diff --git a/mdop/appv-v5/how-to-use-an-app-v-46-sp1-application-from-an-app-v-50-application.md b/mdop/appv-v5/how-to-use-an-app-v-46-sp1-application-from-an-app-v-50-application.md index c265b6155e..0345a45113 100644 --- a/mdop/appv-v5/how-to-use-an-app-v-46-sp1-application-from-an-app-v-50-application.md +++ b/mdop/appv-v5/how-to-use-an-app-v-46-sp1-application-from-an-app-v-50-application.md @@ -1,3 +1,4 @@ +--- ms.reviewer: title: How to Use an App-V 4.6 Application From an App-V 5.0 Application description: How to Use an App-V 4.6 Application From an App-V 5.0 Application From 0608a8238ce20350dc63edba9bed665b5078f178 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 12:05:48 -0800 Subject: [PATCH 18/22] Update manage-settings-app-with-group-policy.md --- .../client-management/manage-settings-app-with-group-policy.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/client-management/manage-settings-app-with-group-policy.md b/windows/client-management/manage-settings-app-with-group-policy.md index ef2bf77cba..5aced0db2c 100644 --- a/windows/client-management/manage-settings-app-with-group-policy.md +++ b/windows/client-management/manage-settings-app-with-group-policy.md @@ -16,8 +16,7 @@ ms.topic: article - Windows 10, Windows Server 2016 - -# Manage the Settings app with Group Policy +## Manage the Settings app with Group Policy You can now manage the pages that are shown in the Settings app by using Group Policy. This lets you hide specific pages from users. Before Windows 10, version 1703, you could either show everything in the Settings app or hide it completely. To make use of the Settings App group polices on Windows server 2016, install fix [4457127](https://support.microsoft.com/help/4457127/windows-10-update-kb4457127) or a later cumulative update. From c774805958e7b90aadc5943830041a7835c2b035 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 12:09:41 -0800 Subject: [PATCH 19/22] Update whats-new-in-microsoft-defender-atp.md --- .../whats-new-in-microsoft-defender-atp.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md index 73d6f92070..4ca54961c2 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md @@ -27,7 +27,7 @@ The following features are generally available (GA) in the latest release of Mic For more information preview features, see [Preview features](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/preview-windows-defender-advanced-threat-protection). -## November 2019 +## November-December 2019 - [Microsoft Defender ATP for Mac](microsoft-defender-atp-mac.md)
Microsoft Defender ATP for Mac brings the next-generation protection to Mac devices. Core components of the unified endpoint security platform will now be available for Mac devices, including [endpoint detection and response](endpoint-detection-response-mac-preview.md). From 2a771c8e44bec2fa13f795610a79a858c7b1694f Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 2 Dec 2019 12:19:30 -0800 Subject: [PATCH 20/22] Update mac-preferences.md --- .../threat-protection/microsoft-defender-atp/mac-preferences.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md index 2481682ec7..c5b8407fc6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-preferences.md @@ -225,7 +225,7 @@ Diagnostic data is used to keep Microsoft Defender ATP secure and up-to-date, de ||| |:---|:---| -| **Domain** | com.microsoft.wdav | +| **Domain** | `com.microsoft.wdav` | | **Key** | diagnosticLevel | | **Data type** | String | | **Possible values** | optional (default)
required | From af62b4f37900deb799c33d93a3842b2c17487144 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 4 Dec 2019 09:29:17 -0800 Subject: [PATCH 21/22] Update manage-settings-app-with-group-policy.md --- .../manage-settings-app-with-group-policy.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/client-management/manage-settings-app-with-group-policy.md b/windows/client-management/manage-settings-app-with-group-policy.md index 5aced0db2c..97ea145013 100644 --- a/windows/client-management/manage-settings-app-with-group-policy.md +++ b/windows/client-management/manage-settings-app-with-group-policy.md @@ -12,12 +12,13 @@ ms.author: dansimp ms.topic: article --- +# Manage the Settings app with Group Policy + + **Applies to** - Windows 10, Windows Server 2016 -## Manage the Settings app with Group Policy - You can now manage the pages that are shown in the Settings app by using Group Policy. This lets you hide specific pages from users. Before Windows 10, version 1703, you could either show everything in the Settings app or hide it completely. To make use of the Settings App group polices on Windows server 2016, install fix [4457127](https://support.microsoft.com/help/4457127/windows-10-update-kb4457127) or a later cumulative update. From 8285b91ef58c1dda7a7f962a3de7d06719a7e2cb Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 4 Dec 2019 09:30:13 -0800 Subject: [PATCH 22/22] Update iexpress-command-line-options.md --- .../ie11-ieak/iexpress-command-line-options.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/browsers/internet-explorer/ie11-ieak/iexpress-command-line-options.md b/browsers/internet-explorer/ie11-ieak/iexpress-command-line-options.md index 54f7c5ab5e..cd7c730569 100644 --- a/browsers/internet-explorer/ie11-ieak/iexpress-command-line-options.md +++ b/browsers/internet-explorer/ie11-ieak/iexpress-command-line-options.md @@ -14,11 +14,11 @@ ms.sitesec: library ms.date: 07/27/2017 --- +# IExpress Wizard command-line options **Applies to:** - Windows Server 2008 R2 with SP1 -## IExpress Wizard command-line options Use command-line options with the IExpress Wizard (IExpress.exe) to control your Internet Explorer custom browser package extraction process. These command-line options work with IExpress: