diff --git a/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md index 11c42404cd..a69d7ffe3a 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md @@ -37,12 +37,9 @@ You can specify the level of cloud-protection offered by Windows Defender Antivi 4. Select **Properties**, select **Settings: Configure**, and then select **Windows Defender Antivirus**. 5. On the **File Blocking Level** switch, select one of the following: - 1. **High** to provide a strong level of detection - 2. **High +** to apply additional protection measures - 3. **Zero tolerance** to block all unknown executables - - > [!WARNING] - > While unlikely, setting this switch to **High** might cause some legitimate files to be detected. The **High +** setting might impact client performance. We recommend you set this to the default level (**Not configured**). + 1. **High** Applies a strong level of detection. + 2. **High +** Uses the high level and applies additional protection measures(may impact client performance). + 3. **Zero tolerance** Block all unknown executables. 8. Click **OK** to exit the **Windows Defender Antivirus** settings pane, click **OK** to exit the **Device restrictions** pane, and then click **Save** to save the changes to your **Device restrictions** profile. @@ -65,14 +62,13 @@ For more information about Intune device profiles, including how to create and c 1. Double-click the **Select cloud protection level** setting and set it to **Enabled**. Select the level of protection: 1. Setting to **Default Windows Defender Antivirus blocking level** provides strong detection without increasing the risk of detecting legitimate files. - 2. Setting to **High blocking level** applies a strong level of detection. - 3. **High + blocking level** applies additional protection measures. + 2. Setting to **High blocking level** applies a strong level of detection while optimizing client performace (greater chances of false positives). + 3. **High + blocking level** applies additional protection measures(may impact client performance and increase rsik of false positives). 4. **Zero tolerance blocking level** blocks all unknown executables. > [!WARNING] - > While unlikely, setting this switch to **High** might cause some legitimate files to be detected (although you will have the option to unblock or dispute that detection). The **High +** setting might impact client performance. We recommend you set this to the default level (**Not configured**). - -1. Click **OK**. + > While unlikely, setting this switch to **High** and **High +** might cause some legitimate files to be detected (although you will have the option to unblock or dispute that detection). +6. Click **OK**.