From 57f2babbbbb43beab3b9d7168fa2757a00f259f0 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Tue, 24 Mar 2020 15:21:35 -0700 Subject: [PATCH 01/15] Indented final paragraph in list items These corrections follow my review of [PR 2366](https://github.com/MicrosoftDocs/windows-docs-pr/pull/2366), where I discovered the final paragraphs in these two list items were not indented with the rest of the list items. --- .../microsoft-defender-atp/customize-exploit-protection.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md index 64a77031bf..30dd08b49c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/customize-exploit-protection.md @@ -89,7 +89,7 @@ Validate stack integrity (StackPivot) | Ensures that the stack has not been redi > > Mikael then adds the app *test.exe* to the **Program settings** section. In the options for that app, under **Data Execution Prevention (DEP)**, he enables the **Override system settings** option and sets the switch to **On**. There are no other apps listed in the **Program settings** section. > -> The result will be that DEP only will be enabled for *test.exe*. All other apps will not have DEP applied. +> The result will be that DEP only will be enabled for *test.exe*. All other apps will not have DEP applied. > > > * **Example 2** @@ -100,8 +100,7 @@ Validate stack integrity (StackPivot) | Ensures that the stack has not been redi > > Josie also adds the app *miles.exe* to the **Program settings** section and configures **Control flow guard (CFG)** to **On**. She doesn't enable the **Override system settings** option for DEP or any other mitigations for that app. > ->The result will be that DEP will be enabled for *test.exe*. DEP will not be enabled for any other app, including *miles.exe*. ->CFG will be enabled for *miles.exe*. +> The result will be that DEP will be enabled for *test.exe*. DEP will not be enabled for any other app, including *miles.exe*. CFG will be enabled for *miles.exe*. > [!NOTE] > If you have found any issues in this article, you can report it directly to a Windows Server/Windows Client partner or use the Microsoft technical support numbers for your country. From 365eddd68c90e08579a9b0ac87977399d1d43be7 Mon Sep 17 00:00:00 2001 From: Jreeds001 Date: Wed, 22 Apr 2020 14:33:45 -0700 Subject: [PATCH 02/15] file name change --- ...gs.md => microsoft-defender-smartscreen-available-settings.md} | 0 ...een-overview.md => microsoft-defender-smartscreen-overview.md} | 0 ...md => microsoft-defender-smartscreen-set-individual-device.md} | 0 3 files changed, 0 insertions(+), 0 deletions(-) rename windows/security/threat-protection/windows-defender-smartscreen/{windows-defender-smartscreen-available-settings.md => microsoft-defender-smartscreen-available-settings.md} (100%) rename windows/security/threat-protection/windows-defender-smartscreen/{windows-defender-smartscreen-overview.md => microsoft-defender-smartscreen-overview.md} (100%) rename windows/security/threat-protection/windows-defender-smartscreen/{windows-defender-smartscreen-set-individual-device.md => microsoft-defender-smartscreen-set-individual-device.md} (100%) diff --git a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md b/windows/security/threat-protection/windows-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md similarity index 100% rename from windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md rename to windows/security/threat-protection/windows-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md diff --git a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md b/windows/security/threat-protection/windows-defender-smartscreen/microsoft-defender-smartscreen-overview.md similarity index 100% rename from windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md rename to windows/security/threat-protection/windows-defender-smartscreen/microsoft-defender-smartscreen-overview.md diff --git a/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device.md b/windows/security/threat-protection/windows-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md similarity index 100% rename from windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device.md rename to windows/security/threat-protection/windows-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md From 1924063f62b904d80f3d736c685fc4882edd8ff6 Mon Sep 17 00:00:00 2001 From: Jreeds001 Date: Wed, 22 Apr 2020 14:58:00 -0700 Subject: [PATCH 03/15] Update TOC.md --- windows/security/threat-protection/TOC.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 44e43335b6..908c7c4a1e 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -700,9 +700,9 @@ #### [Family options](windows-defender-security-center/wdsc-family-options.md) -### [Microsoft Defender SmartScreen](windows-defender-smartscreen/windows-defender-smartscreen-overview.md) -#### [Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md) -#### [Set up and use Microsft Defender SmartScreen on individual devices](windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device.md) +### [Microsoft Defender SmartScreen](microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md) +#### [Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings](microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md) +#### [Set up and use Microsft Defender SmartScreen on individual devices](microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md) ### [Windows Sandbox](windows-sandbox/windows-sandbox-overview.md) #### [Windows Sandbox architecture](windows-sandbox/windows-sandbox-architecture.md) From edc1935bcd6086927ec1eeb81600e701c29c5439 Mon Sep 17 00:00:00 2001 From: Jreeds001 Date: Wed, 22 Apr 2020 15:10:57 -0700 Subject: [PATCH 04/15] changed smartscreen file folder --- .openpublishing.redirection.json | 2 +- .../Microsoft-Defender-Smartscreen-submission.png | Bin .../Windows-defender-smartscreen-control-2020.png | Bin .../images/windows-defender-security-center.png | Bin .../images/windows-defender-smartscreen-control.png | Bin ...osoft-defender-smartscreen-available-settings.md | 0 .../microsoft-defender-smartscreen-overview.md | 0 ...ft-defender-smartscreen-set-individual-device.md | 0 8 files changed, 1 insertion(+), 1 deletion(-) rename windows/security/threat-protection/{windows-defender-smartscreen => microsoft-defender-smartscreen}/images/Microsoft-Defender-Smartscreen-submission.png (100%) rename windows/security/threat-protection/{windows-defender-smartscreen => microsoft-defender-smartscreen}/images/Windows-defender-smartscreen-control-2020.png (100%) rename windows/security/threat-protection/{windows-defender-smartscreen => microsoft-defender-smartscreen}/images/windows-defender-security-center.png (100%) rename windows/security/threat-protection/{windows-defender-smartscreen => microsoft-defender-smartscreen}/images/windows-defender-smartscreen-control.png (100%) rename windows/security/threat-protection/{windows-defender-smartscreen => microsoft-defender-smartscreen}/microsoft-defender-smartscreen-available-settings.md (100%) rename windows/security/threat-protection/{windows-defender-smartscreen => microsoft-defender-smartscreen}/microsoft-defender-smartscreen-overview.md (100%) rename windows/security/threat-protection/{windows-defender-smartscreen => microsoft-defender-smartscreen}/microsoft-defender-smartscreen-set-individual-device.md (100%) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index fd80622eef..738f52aaf9 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -767,7 +767,7 @@ }, { "source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md", -"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview", +"redirect_url": "https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview", "redirect_document_id": true }, { diff --git a/windows/security/threat-protection/windows-defender-smartscreen/images/Microsoft-Defender-Smartscreen-submission.png b/windows/security/threat-protection/microsoft-defender-smartscreen/images/Microsoft-Defender-Smartscreen-submission.png similarity index 100% rename from windows/security/threat-protection/windows-defender-smartscreen/images/Microsoft-Defender-Smartscreen-submission.png rename to windows/security/threat-protection/microsoft-defender-smartscreen/images/Microsoft-Defender-Smartscreen-submission.png diff --git a/windows/security/threat-protection/windows-defender-smartscreen/images/Windows-defender-smartscreen-control-2020.png b/windows/security/threat-protection/microsoft-defender-smartscreen/images/Windows-defender-smartscreen-control-2020.png similarity index 100% rename from windows/security/threat-protection/windows-defender-smartscreen/images/Windows-defender-smartscreen-control-2020.png rename to windows/security/threat-protection/microsoft-defender-smartscreen/images/Windows-defender-smartscreen-control-2020.png diff --git a/windows/security/threat-protection/windows-defender-smartscreen/images/windows-defender-security-center.png b/windows/security/threat-protection/microsoft-defender-smartscreen/images/windows-defender-security-center.png similarity index 100% rename from windows/security/threat-protection/windows-defender-smartscreen/images/windows-defender-security-center.png rename to windows/security/threat-protection/microsoft-defender-smartscreen/images/windows-defender-security-center.png diff --git a/windows/security/threat-protection/windows-defender-smartscreen/images/windows-defender-smartscreen-control.png b/windows/security/threat-protection/microsoft-defender-smartscreen/images/windows-defender-smartscreen-control.png similarity index 100% rename from windows/security/threat-protection/windows-defender-smartscreen/images/windows-defender-smartscreen-control.png rename to windows/security/threat-protection/microsoft-defender-smartscreen/images/windows-defender-smartscreen-control.png diff --git a/windows/security/threat-protection/windows-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md similarity index 100% rename from windows/security/threat-protection/windows-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md rename to windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md diff --git a/windows/security/threat-protection/windows-defender-smartscreen/microsoft-defender-smartscreen-overview.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md similarity index 100% rename from windows/security/threat-protection/windows-defender-smartscreen/microsoft-defender-smartscreen-overview.md rename to windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md diff --git a/windows/security/threat-protection/windows-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md similarity index 100% rename from windows/security/threat-protection/windows-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md rename to windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md From 30f2ee20f4a53b74d423d6732a34df88b1e6137d Mon Sep 17 00:00:00 2001 From: Jreeds001 Date: Wed, 22 Apr 2020 16:09:59 -0700 Subject: [PATCH 05/15] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 738f52aaf9..79e05879c5 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -762,7 +762,7 @@ }, { "source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md", -"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings", +"redirect_url": "hhttps://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings", "redirect_document_id": true }, { @@ -772,7 +772,7 @@ }, { "source_path": "windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device.md", -"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device", +"redirect_url": "https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device", "redirect_document_id": true }, { @@ -13108,7 +13108,7 @@ }, { "source_path": "windows/keep-secure/windows-defender-smartscreen-available-settings.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings", +"redirect_url": "https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings", "redirect_document_id": true }, { @@ -13118,7 +13118,7 @@ }, { "source_path": "windows/keep-secure/windows-defender-smartscreen-set-individual-device.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device", +"redirect_url": "https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device", "redirect_document_id": true }, { From 3e55f266c44991e71c50f1661a5918c8a1aef304 Mon Sep 17 00:00:00 2001 From: pawinfie <59937840+pawinfie@users.noreply.github.com> Date: Thu, 23 Apr 2020 07:16:38 -0700 Subject: [PATCH 06/15] Fixed broken link --- devices/hololens/hololens-enroll-mdm.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/devices/hololens/hololens-enroll-mdm.md b/devices/hololens/hololens-enroll-mdm.md index bce3d27644..0e557e9c50 100644 --- a/devices/hololens/hololens-enroll-mdm.md +++ b/devices/hololens/hololens-enroll-mdm.md @@ -29,7 +29,7 @@ You can manage multiple Microsoft HoloLens devices simultaneously using solution ## Auto-enrollment in MDM -If your organization uses Azure Active Directory (Azure AD) and an MDM solution that accepts an AAD token for authentication (currently, only supported in Microsoft Intune and AirWatch), your IT admin can configure Azure AD to automatically allow MDM enrollment after the user signs in with their Azure AD account. [Learn how to configure Azure AD enrollment.](https://docs.microsoft.com/intune/deploy-use/set-up-windows-device-management-with-microsoft-intune#azure-active-directory-enrollment) +If your organization uses Azure Active Directory (Azure AD) and an MDM solution that accepts an AAD token for authentication (currently, only supported in Microsoft Intune and AirWatch), your IT admin can configure Azure AD to automatically allow MDM enrollment after the user signs in with their Azure AD account. [Learn how to configure Azure AD enrollment.](https://docs.microsoft.com/mem/intune/enrollment/windows-enroll#enable-windows-10-automatic-enrollment) When auto-enrollment is enabled, no additional manual enrollment is needed. When the user signs in with an Azure AD account, the device is enrolled in MDM after completing the first-run experience. @@ -45,4 +45,4 @@ Your device is now enrolled with your MDM server. The device will need to restar ## Unenroll HoloLens from Intune -You cannot [unenroll](https://docs.microsoft.com/intune-user-help/unenroll-your-device-from-intune-windows) HoloLens from Intune remotely. If the administrator unenrolls the device using MDM, the device will age out of the Intune dashboard. \ No newline at end of file +You cannot [unenroll](https://docs.microsoft.com/intune-user-help/unenroll-your-device-from-intune-windows) HoloLens from Intune remotely. If the administrator unenrolls the device using MDM, the device will age out of the Intune dashboard. From d6cdabd6101b26537201ac4adbcf7a0cde0185d4 Mon Sep 17 00:00:00 2001 From: Jreeds001 Date: Thu, 23 Apr 2020 10:41:58 -0700 Subject: [PATCH 07/15] Update microsoft-defender-smartscreen-overview.md --- .../microsoft-defender-smartscreen-overview.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md index 56b4084b8b..cb81f9cb97 100644 --- a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md +++ b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md @@ -88,5 +88,6 @@ EventID | Description 1002 | User Decision Windows Defender SmartScreen Event ## Related topics +- [SmartScreen Frequently Asked Questions](https://fb.smartscreen.microsoft.com/smartscreenfaq.aspx) - [Threat protection](../index.md) - [Available Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings) From 187f033f6894073dd19c8b75cade1005b5e3f365 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 23 Apr 2020 11:40:06 -0700 Subject: [PATCH 08/15] remove --- .../information-protection-in-windows-overview.md | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md index 34cb228572..0c80426a9f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/information-protection-in-windows-overview.md @@ -2,7 +2,7 @@ title: Information protection in Windows overview ms.reviewer: description: Learn about how information protection works in Windows to identify and protect sensitive information -keywords: information, protection, dlp, wip, data, loss, prevention, protect +keywords: information, protection, dlp, data, loss, prevention, protect search.product: eADQiWindows 10XVcnh ms.prod: w10 ms.mktglfcycl: deploy @@ -35,7 +35,7 @@ Microsoft Defender ATP applies the following methods to discover, classify, and - **Data discovery** - Identify sensitive data on Windows devices at risk - **Data classification** - Automatically classify data based on common Microsoft Information Protection (MIP) policies managed in Office 365 Security & Compliance Center. Auto-classification allows you to protect sensitive data even if the end user hasn’t manually classified it. -- **Data protection** - Windows Information Protection (WIP) as outcome of Azure Information Protection label + ## Data discovery and data classification @@ -95,6 +95,4 @@ InformationProtectionLogs_CL - Go to **Settings** in Microsoft Defender Security Center, click on **Advanced Settings** under **General**. -## Related topics -- [How Windows Information Protection protects files with a sensitivity label](https://docs.microsoft.com/windows/security/information-protection/windows-information-protection/how-wip-works-with-labels) From 2524352a600abd34f2b57968090f26b9959f81f6 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Thu, 23 Apr 2020 12:11:11 -0700 Subject: [PATCH 09/15] update filter --- .../microsoft-defender-atp/machines-view-overview.md | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md b/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md index 6b96503525..e570e0634a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md @@ -71,12 +71,13 @@ Filter by the following machine health states: For more information on how to address issues on misconfigured machines see, [Fix unhealthy sensors](fix-unhealthy-sensors.md). -### Security state +### Antivirus status -Filter by machines that are well configured or require attention based on the security controls that are enabled in your organization. Applies to active Windows 10 machines only. +Filter machines by antivirus status. Applies to active Windows 10 machines only. -- **Well configured** - Machines have the security controls well configured. -- **Requires attention** - Machines where improvements can be made to increase the overall security posture of your organization. +- **Disabled** - Virus & threat protection is turned off. +- **Not reporting** - Virus & threat protection is not reporting. +- **Not updated** - Virus & threat protection is not up to date. For more information, see [View the Threat & Vulnerability Management dashboard](tvm-dashboard-insights.md). From 8b207980f2b07e3ebadb5e44d5b7c32ce5fcdfbf Mon Sep 17 00:00:00 2001 From: Thomas Raya Date: Thu, 23 Apr 2020 16:30:23 -0700 Subject: [PATCH 10/15] Update windows defender to microsoft defender updating file references in topics to match updated file names --- .../microsoft-defender-smartscreen-available-settings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md index 8181c99856..60760b7cac 100644 --- a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md +++ b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md @@ -214,7 +214,7 @@ To better help you protect your organization, we recommend turning on and using ## Related topics - [Threat protection](../index.md) -- [Microsoft Defender SmartScreen overview](windows-defender-smartscreen-overview.md) +- [Microsoft Defender SmartScreen overview](microsoft-defender-smartscreen-overview.md) - [Available Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge](/microsoft-edge/deploy/available-policies) From 881cbbc4f49305a8b9ebb6facc2d3e8bff22fd58 Mon Sep 17 00:00:00 2001 From: Thomas Raya Date: Thu, 23 Apr 2020 16:31:35 -0700 Subject: [PATCH 11/15] Update microsoft-defender-smartscreen-overview.md --- .../microsoft-defender-smartscreen-overview.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md index cb81f9cb97..973fe53199 100644 --- a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md +++ b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md @@ -49,7 +49,7 @@ Microsoft Defender SmartScreen provide an early warning system against websites - **Improved heuristics and diagnostic data.** Microsoft Defender SmartScreen is constantly learning and endeavoring to stay up-to-date, so it can help to protect you against potentially malicious sites and files. -- **Management through Group Policy and Microsoft Intune.** Microsoft Defender SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info about all available settings, see [Available Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md). +- **Management through Group Policy and Microsoft Intune.** Microsoft Defender SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info about all available settings, see [Available Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings](microsoft-defender-smartscreen-available-settings.md). - **Blocking URLs associated with potentially unwanted applications.** In Microsoft Edge (based on Chromium), SmartScreen blocks URLs associated with potentially unwanted applications, or PUAs. For more information on blocking URLs associated with PUAs, see [Detect and block potentially unwanted applications](../windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md). From 2d01a45b1e73ac476fc4e92c42415c0b975a0d1b Mon Sep 17 00:00:00 2001 From: Thomas Raya Date: Thu, 23 Apr 2020 16:32:17 -0700 Subject: [PATCH 12/15] Update microsoft-defender-smartscreen-set-individual-device.md --- .../microsoft-defender-smartscreen-set-individual-device.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md index dd2eb47e6c..728d759855 100644 --- a/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md +++ b/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md @@ -82,7 +82,7 @@ Microsoft Defender SmartScreen can be configured to warn users from going to a p ## Related topics - [Threat protection](../index.md) -- [Microsoft Defender SmartScreen overview](windows-defender-smartscreen-overview.md) +- [Microsoft Defender SmartScreen overview](microsoft-defender-smartscreen-overview.md) >[!NOTE] >Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md). From f52c368d28da93729f5d778948fbab4c5f759da3 Mon Sep 17 00:00:00 2001 From: Thomas Raya Date: Thu, 23 Apr 2020 16:38:03 -0700 Subject: [PATCH 13/15] Update network-protection.md --- .../microsoft-defender-atp/network-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/network-protection.md b/windows/security/threat-protection/microsoft-defender-atp/network-protection.md index 64488a550e..26080c90cd 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/network-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/network-protection.md @@ -27,7 +27,7 @@ ms.custom: asr Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. -Network protection expands the scope of [Windows Defender SmartScreen](../windows-defender-smartscreen/windows-defender-smartscreen-overview.md) to block all outbound HTTP(s) traffic that attempts to connect to low-reputation sources (based on the domain or hostname). +Network protection expands the scope of [Microsoft Defender SmartScreen](../microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md) to block all outbound HTTP(s) traffic that attempts to connect to low-reputation sources (based on the domain or hostname). Network protection is supported beginning with Windows 10, version 1709. From 48212cb140611ea9058a7ca528799ecd0976db9e Mon Sep 17 00:00:00 2001 From: Thomas Raya Date: Thu, 23 Apr 2020 16:39:00 -0700 Subject: [PATCH 14/15] Update overview-of-threat-mitigations-in-windows-10.md --- .../overview-of-threat-mitigations-in-windows-10.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md index fe80c5c8a4..ee51de1614 100644 --- a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md +++ b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md @@ -86,7 +86,7 @@ Windows Defender SmartScreen notifies users if they click on reported phishing a For Windows 10, Microsoft improved SmartScreen (now called Windows Defender SmartScreen) protection capability by integrating its app reputation abilities into the operating system itself, which allows Windows Defender SmartScreen to check the reputation of files downloaded from the Internet and warn users when they’re about to run a high-risk downloaded file. The first time a user runs an app that originates from the Internet, Windows Defender SmartScreen checks the reputation of the application by using digital signatures and other factors against a service that Microsoft maintains. If the app lacks a reputation or is known to be malicious, Windows Defender SmartScreen warns the user or blocks execution entirely, depending on how the administrator has configured Microsoft Intune or Group Policy settings. -For more information, see [Windows Defender SmartScreen overview](windows-defender-smartscreen/windows-defender-smartscreen-overview.md). +For more information, see [Microsoft Defender SmartScreen overview](microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md). ### Windows Defender Antivirus From b935b19f4f90c6bbe0ad6b13f23c41d5d3d2e12a Mon Sep 17 00:00:00 2001 From: Thomas Raya Date: Thu, 23 Apr 2020 16:39:41 -0700 Subject: [PATCH 15/15] Update detect-block-potentially-unwanted-apps-windows-defender-antivirus.md --- ...lock-potentially-unwanted-apps-windows-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md index 3fb436099a..91816a7033 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md @@ -41,7 +41,7 @@ Potentially unwanted applications can increase the risk of your network being in ### Microsoft Edge -The next major version of Microsoft Edge, which is Chromium-based, blocks potentially unwanted application downloads and associated resource URLs. This feature is provided via [Windows Defender SmartScreen](../windows-defender-smartscreen/windows-defender-smartscreen-overview.md). +The next major version of Microsoft Edge, which is Chromium-based, blocks potentially unwanted application downloads and associated resource URLs. This feature is provided via [Microsoft Defender SmartScreen](../microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md). #### Enable PUA protection in Chromium-based Microsoft Edge