diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index 77a4bfc8ad..b3c127d6c2 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -16,10 +16,13 @@ localizationpriority: high - Windows 10 - Windows 10 Mobile -You can use Group Policy or mobile device management (MDM) settings to set up and manage Windows Defender SmartScreen in your organization. +Windows Defender SmartScreen works with Group Policy and mobile device management (MDM) settings to help you manage your organization's computer settings. ->[!NOTE] ->To apply your Group Policy setting to all users of a computer, you should use the setting in the Computer Configuration policy. To apply your Group Policy setting to specific users, you should use the setting in the User Configuration policy. +## Group Policy settings +Group Policy objects (GPO's) can include registry-based Administrative Template policy settings, security settings, software deployment information, scripts, folder redirection, and preferences. By using Group Policy and Intune, you can set up a policy setting once, and then copy that setting onto many computers. For example, you can set up multiple security settings in a GPO that's linked to a domain, and then apply all of those settings to every computer in the domain. + +>[!Note] +>To apply your Group Policy setting to all users of a computer, you should use the setting in the Computer Configuration policy. To apply your Group Policy setting to specific users, you should use the setting in the User Configuration policy. For more info about Group Policy, see the [Group Policy TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=214514). This site provides links to the latest technical documentation, videos, and downloads for Group Policy.
This policy setting prevents the employee from managing SmartScreen Filter. If you enable this policy setting, the employee isn't prompted to turn on SmartScreen Filter. All website addresses that are not on the filter's allow list are sent automatically to Microsoft without prompting the employee. If you disable or don't configure this policy setting (default), the employee is prompted to decide whether to turn on SmartScreen Filter during the first-run experience. |
||||
Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warnings | +Administrative Templates\Windows Components\Internet Explorer\Prevent bypassing SmartScreen Filter warnings | Windows 10 | This policy setting determines whether an employee can bypass warnings from SmartScreen Filter. If you enable this policy setting, SmartScreen Filter warnings block the employee. If you disable or don't configure this policy setting (default), the employee can bypass SmartScreen Filter warnings. |
Setting | +Supported versions | +Details | +
---|---|---|
AllowSmartScreen | +Windows 10 | +
+
|
+
EnableAppInstallControl | +Windows 10, Version 1703 | +
+
|
+
EnableSmartScreenInShell | +Windows 10, Version 1703 | +
+
|
+
PreventOverrideForFilesInShell | +Windows 10, Version 1703 | +
+
|
+
PreventSmartScreenPromptOverride | +Windows 10, Version 1511 and later | +
+
|
+
PreventSmartScreenPromptOverrideForFiles | +Windows 10, Version 1511 and later | +
+
|
+