mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
update allowed blocked lists
This commit is contained in:
parent
61caeb1d93
commit
b4295544c7
@ -10,7 +10,7 @@ ms.pagetype: security
|
||||
ms.author: macapara
|
||||
author: mjcaparas
|
||||
ms.localizationpriority: high
|
||||
ms.date: 04/24/2018
|
||||
ms.date: 06/13/2018
|
||||
---
|
||||
|
||||
# Query data using Advanced hunting in Windows Defender ATP
|
||||
@ -54,6 +54,8 @@ We then add a filter on the _FileName_ to contain only instances of _powershell
|
||||
Afterwards, we add a filter on the _ProcessCommandLine_
|
||||
Finally, we project only the columns we're interested in exploring and limit the results to 100 and click **Run query**.
|
||||
|
||||
You have the option of expanding the screen view so you can focus on your hunting query and related results.
|
||||
|
||||
### Use operators
|
||||
The query language is very powerful and has a lot of available operators, some of them are -
|
||||
|
||||
|
@ -10,7 +10,7 @@ ms.pagetype: security
|
||||
ms.author: macapara
|
||||
author: mjcaparas
|
||||
ms.localizationpriority: high
|
||||
ms.date: 06/11/2018
|
||||
ms.date: 06/14/2018
|
||||
---
|
||||
|
||||
# Manage automation allowed/blocked lists
|
||||
@ -43,8 +43,6 @@ You can define the conditions for when entities are identified as malicious or s
|
||||
- Certificate
|
||||
- IP address
|
||||
- DNS
|
||||
- Email
|
||||
- Process memory
|
||||
|
||||
3. Click **Add system exclusion**.
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user