Detailed explanation of level

As the user suggested, I have applied detailed descriptions of levels. 

Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4577
This commit is contained in:
ImranHabib 2019-09-30 08:42:01 +05:00 committed by GitHub
parent 7ce8990fbc
commit 9c3eee5471
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -37,12 +37,9 @@ You can specify the level of cloud-protection offered by Windows Defender Antivi
4. Select **Properties**, select **Settings: Configure**, and then select **Windows Defender Antivirus**.
5. On the **File Blocking Level** switch, select one of the following:
1. **High** to provide a strong level of detection
2. **High +** to apply additional protection measures
3. **Zero tolerance** to block all unknown executables
> [!WARNING]
> While unlikely, setting this switch to **High** might cause some legitimate files to be detected. The **High +** setting might impact client performance. We recommend you set this to the default level (**Not configured**).
1. **High** Applies a strong level of detection.
2. **High +** Uses the high level and applies additional protection measures(may impact client performance).
3. **Zero tolerance** Block all unknown executables.
8. Click **OK** to exit the **Windows Defender Antivirus** settings pane, click **OK** to exit the **Device restrictions** pane, and then click **Save** to save the changes to your **Device restrictions** profile.
@ -65,14 +62,13 @@ For more information about Intune device profiles, including how to create and c
1. Double-click the **Select cloud protection level** setting and set it to **Enabled**. Select the level of protection:
1. Setting to **Default Windows Defender Antivirus blocking level** provides strong detection without increasing the risk of detecting legitimate files.
2. Setting to **High blocking level** applies a strong level of detection.
3. **High + blocking level** applies additional protection measures.
2. Setting to **High blocking level** applies a strong level of detection while optimizing client performace (greater chances of false positives).
3. **High + blocking level** applies additional protection measures(may impact client performance and increase rsik of false positives).
4. **Zero tolerance blocking level** blocks all unknown executables.
> [!WARNING]
> While unlikely, setting this switch to **High** might cause some legitimate files to be detected (although you will have the option to unblock or dispute that detection). The **High +** setting might impact client performance. We recommend you set this to the default level (**Not configured**).
1. Click **OK**.
> While unlikely, setting this switch to **High** and **High +** might cause some legitimate files to be detected (although you will have the option to unblock or dispute that detection).
6. Click **OK**.