Merge remote-tracking branch 'refs/remotes/origin/master' into vs-9914655

This commit is contained in:
LizRoss 2017-02-28 08:39:38 -08:00
commit b0339d14ff
11 changed files with 11 additions and 11 deletions

View File

@ -6,7 +6,7 @@ ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: security ms.pagetype: security
author: jdeckerMS author: DaniHalfin
localizationpriority: high localizationpriority: high
--- ---
# Windows Hello and password changes # Windows Hello and password changes

View File

@ -7,7 +7,7 @@ ms.prod: w10
ms.mktglfcycl: explore ms.mktglfcycl: explore
ms.sitesec: library ms.sitesec: library
ms.pagetype: security ms.pagetype: security
author: jdeckerMS author: DaniHalfin
localizationpriority: high localizationpriority: high
--- ---

View File

@ -5,7 +5,7 @@ keywords: ["identity", "PIN", "biometric", "Hello"]
ms.prod: W10 ms.prod: W10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
author: jdeckerMS author: DaniHalfin
localizationpriority: high localizationpriority: high
--- ---

View File

@ -7,7 +7,7 @@ ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: security ms.pagetype: security
author: jdeckerMS author: DaniHalfin
localizationpriority: high localizationpriority: high
--- ---

View File

@ -7,7 +7,7 @@ ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: security ms.pagetype: security
author: jdeckerMS author: DaniHalfin
localizationpriority: high localizationpriority: high
--- ---

View File

@ -5,7 +5,7 @@ ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: security ms.pagetype: security
author: jdeckerMS author: DaniHalfin
localizationpriority: high localizationpriority: high
--- ---
# How Windows Hello for Business works # How Windows Hello for Business works

View File

@ -7,7 +7,7 @@ ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: security, mobile ms.pagetype: security, mobile
author: jdeckerMS author: DaniHalfin
localizationpriority: high localizationpriority: high
--- ---
# Windows Hello for Business # Windows Hello for Business

View File

@ -7,7 +7,7 @@ ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: security ms.pagetype: security
author: jdeckerMS author: DaniHalfin
localizationpriority: high localizationpriority: high
--- ---

View File

@ -7,7 +7,7 @@ ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: security ms.pagetype: security
author: jdeckerMS author: DaniHalfin
localizationpriority: high localizationpriority: high
--- ---

View File

@ -7,7 +7,7 @@ ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: security ms.pagetype: security
author: jdeckerMS author: DaniHalfin
localizationpriority: high localizationpriority: high
--- ---

View File

@ -31,7 +31,7 @@ It is enabled by default when certain pre-requisite settings are also enabled. I
When a Windows Defender client encounters a suspicious but undetected file, it queries our cloud protection backend. The cloud backend will apply heuristics, machine learning, and automated analysis of the file to determine the files as malicious or clean. When a Windows Defender client encounters a suspicious but undetected file, it queries our cloud protection backend. The cloud backend will apply heuristics, machine learning, and automated analysis of the file to determine the files as malicious or clean.
> [!NOTE] > [!NOTE]
> The Block at first sight feature only use the cloud protection backend for executable files that are downloaded from the Internet, or originating from the Internet zone. A hash value of the EXE file is checked via the cloud backend to determine if this is a previously undetected file. > The Block at first sight feature only uses the cloud-protection backend for "portable executable" (PE) files that are downloaded from the Internet, or originating from the Internet zone. This includes file types such as .exe, .dll, .scr, and so on. A hash value of the file is checked via the cloud backend to determine if this is a previously undetected file.
If the cloud backend is unable to make a determination, the file will be locked by Windows Defender while a copy is uploaded to the cloud. Only after the cloud has received the file will Windows Defender release the lock and let the file run. The cloud will perform additional analysis to reach a determination, blocking all future encounters of that file. If the cloud backend is unable to make a determination, the file will be locked by Windows Defender while a copy is uploaded to the cloud. Only after the cloud has received the file will Windows Defender release the lock and let the file run. The cloud will perform additional analysis to reach a determination, blocking all future encounters of that file.