From 86e2bfe17411b1a0e886e7cf5f45fa10c8a5bb66 Mon Sep 17 00:00:00 2001 From: Jreeds001 Date: Fri, 27 Mar 2020 12:39:57 -0700 Subject: [PATCH 1/2] Updated information about 1705 Windows Defender SmartScreen settings --- windows/client-management/mdm/policy-csp-smartscreen.md | 2 +- .../windows-defender-smartscreen-available-settings.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-smartscreen.md b/windows/client-management/mdm/policy-csp-smartscreen.md index 205d51bff6..83b2b4ee01 100644 --- a/windows/client-management/mdm/policy-csp-smartscreen.md +++ b/windows/client-management/mdm/policy-csp-smartscreen.md @@ -83,7 +83,7 @@ manager: dansimp Added in Windows 10, version 1703. Allows IT Admins to control whether users are allowed to install apps from places other than the Store. > [!Note] -> This policy will block installation only while the device is online. To block offline installation too, **SmartScreen/PreventOverrideForFilesInShell** and **SmartScreen/EnableSmartScreenInShell** policies should also be enabled. +> This policy will block installation only while the device is online. To block offline installation too, **SmartScreen/PreventOverrideForFilesInShell** and **SmartScreen/EnableSmartScreenInShell** policies should also be enabled.

This policy setting is intended to prevent malicious content from affecting your user's devices when downloading executable content from the internet. diff --git a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md index 939db827c5..3583f22498 100644 --- a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md +++ b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md @@ -40,7 +40,7 @@ SmartScreen uses registry-based Administrative Template policy settings. For mor Administrative Templates\Windows Components\Windows Defender SmartScreen\Explorer\Configure App Install Control Windows 10, version 1703 -This setting helps protect PCs by allowing users to install apps only from the Microsoft Store. Windows Defender SmartScreen must be enabled for this feature to work properly.

If you enable this setting, your employees can only install apps from the Microsoft Store.

If you disable this setting, your employees can install apps from anywhere, including as a download from the Internet.

If you don't configure this setting, your employees can choose whether they can install from anywhere or only from Microsoft Store. +This policy setting is intended to prevent malicious content from affecting your user's devices when downloading executable content from the internet.

This setting does not protect against malicious content from USB devices, network shares or other non-internet sources.

Important: Using a trustworthy browser helps ensure that these protections work as expected. Windows 10, version 1703:
Administrative Templates\Windows Components\Windows Defender SmartScreen\Microsoft Edge\Configure Windows Defender SmartScreen

Windows 10, Version 1607 and earlier:
Administrative Templates\Windows Components\Microsoft Edge\Configure Windows SmartScreen From 540bb61581c0dd73d201c8fb1b0e11f3ac164432 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Fri, 27 Mar 2020 15:18:11 -0700 Subject: [PATCH 2/2] Corrected Acrolinx spelling errors --- .../windows-defender-smartscreen-available-settings.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md index 3583f22498..0dabbdb3b1 100644 --- a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md +++ b/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md @@ -1,6 +1,6 @@ --- title: Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings (Windows 10) -description: A list of all available setttings for Windows Defender SmartScreen using Group Policy and mobile device management (MDM) settings. +description: A list of all available settings for Windows Defender SmartScreen using Group Policy and mobile device management (MDM) settings. keywords: SmartScreen Filter, Windows SmartScreen, Windows Defender SmartScreen ms.prod: w10 ms.mktglfcycl: explore @@ -176,7 +176,7 @@ To better help you protect your organization, we recommend turning on and using Administrative Templates\Windows Components\Microsoft Edge\Prevent bypassing Windows Defender SmartScreen prompts for files -Enable. Stops employees from ingnoring warning messages and continuing to download potentially malicious files. +Enable. Stops employees from ignoring warning messages and continuing to download potentially malicious files. Administrative Templates\Windows Components\File Explorer\Configure Windows Defender SmartScreen @@ -199,7 +199,7 @@ To better help you protect your organization, we recommend turning on and using Browser/PreventSmartScreenPromptOverrideForFiles -1. Stops employees from ingnoring warning messages and continuing to download potentially malicious files. +1. Stops employees from ignoring warning messages and continuing to download potentially malicious files. SmartScreen/EnableSmartScreenInShell