From af9874bbe9bd9cae68b07b1194ac7a792bce568c Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Mon, 4 Dec 2017 18:37:22 -0800 Subject: [PATCH] fix broken anchors --- .../windows-defender-exploit-guard/troubleshoot-asr.md | 4 ++-- .../windows-defender-exploit-guard/troubleshoot-np.md | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md index a2c448b3b1..cf7916a5c3 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md +++ b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md @@ -48,7 +48,7 @@ Attack surface reduction (ASR) will only work on devices with the following cond > - Endpoints are running Windows 10, version 1709 (also known as the Fall Creators Update). > - Endpoints are using Windows Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Windows Defender AV to disable itself](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md). > - [Real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md) is enabled. -> - Audit mode is not enabled. Use Group Policy to set the rule to **Disabled** (value: **0**) as described in the [Enable ASR topic](enable-attack-surface-reduction.md#use-group-policy-to-enable-attack-surface-reduction-rules). +> - Audit mode is not enabled. Use Group Policy to set the rule to **Disabled** (value: **0**) as described in the [Enable ASR topic](enable-attack-surface-reduction.md#use-group-policy-to-enable-or-audit-attack-surface-reduction-rules). If these pre-requisites have all been met, proceed to the next step to test the rule in audit mode. @@ -70,7 +70,7 @@ You should follow the instructions in the section [Use the demo tool to see how Audit mode allows the rule to report as if it actually blocked the file or process, but will still allow the file to run. -1. Enable audit mode for the specific rule you want to test. Use Group Policy to set the rule to **Audit mode** (value: **2**) as described in the [Enable ASR topic](enable-attack-surface-reduction.md#use-group-policy-to-enable-attack-surface-reduction-rules). +1. Enable audit mode for the specific rule you want to test. Use Group Policy to set the rule to **Audit mode** (value: **2**) as described in the [Enable ASR topic](enable-attack-surface-reduction.md#use-group-policy-to-enable-or-audit-attack-surface-reduction-rules). 2. Perform the activity that is causing an issue (for example, open or execute the file or process that should be blocked but is being allowed). 3. [Review the ASR event logs](attack-surface-reduction-exploit-guard.md#review-attack-surface-reduction-events-in-windows-event-viewer) to see if the rule would have blocked the file or process if the rule had been set to **Enabled**. diff --git a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md index 0d9362f88a..2616bba67b 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md +++ b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-np.md @@ -49,7 +49,7 @@ Windows Defender Exploit Guard will only work on devices with the following cond > - Endpoints are using Windows Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Windows Defender AV to disable itself](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md). > - [Real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md) is enabled. > - [Cloud-delivered protection](../windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md) is enabled. -> - Audit mode is not enabled. Use Group Policy to set the rule to **Disabled** (value: **0**) as described in the [Enable ASR topic](enable-attack-surface-reduction.md#use-group-policy-to-enable-attack-surface-reduction-rules). +> - Audit mode is not enabled. Use Group Policy to set the rule to **Disabled** (value: **0**) as described in the [Enable Network protection topic](enable-network-protection.md#use-group-policy-to-enable-or-audit-network-protection). If these pre-requisites have all been met, proceed to the next step to test the rule in audit mode. @@ -73,7 +73,7 @@ You can also use audit mode and then attempt to visit the site or IP (IPv4) addr >[!IMPORTANT] ->Audit mode will stop the Network protection from blocking known malicious connections. +>Audit mode will stop Network protection from blocking known malicious connections. > >If Network protection is not blocking a connection that you are expecting it should block, first check if audit mode is enabled. >