From aa9889e241f0be96307f93ff810a6143d2a9809d Mon Sep 17 00:00:00 2001 From: LizRoss Date: Thu, 16 Mar 2017 10:41:53 -0700 Subject: [PATCH] Updated content --- .../windows-defender-smartscreen-available-settings.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/keep-secure/windows-defender-smartscreen-available-settings.md b/windows/keep-secure/windows-defender-smartscreen-available-settings.md index dd5c2ddec8..490246dd47 100644 --- a/windows/keep-secure/windows-defender-smartscreen-available-settings.md +++ b/windows/keep-secure/windows-defender-smartscreen-available-settings.md @@ -150,10 +150,10 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM -## Recommended Group Policy and mobile device management (MDM) settings for your organization +## Recommended Group Policy and MDM settings for your organization By default, Windows Defender SmartScreen lets employees bypass warnings. Unfortunately, this can let employees continue to an unsafe site or to continue to download an unsafe file, even after being warned. Because of this possibility, we strongly recommend that you set up Windows Defender SmartScreen to block high-risk interactions instead of providing just a warning. -To better help you protect your organization, we recommend turning on and using these specific Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings. +To better help you protect your organization, we recommend turning on and using these specific Windows Defender SmartScreen Group Policy and MDM settings.
Group Policy setting