mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 19:03:46 +00:00
fix warnings
This commit is contained in:
@ -14,7 +14,7 @@ ms.localizationpriority: medium
|
|||||||
manager: dansimp
|
manager: dansimp
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: artilce
|
ms.topic: article
|
||||||
---
|
---
|
||||||
|
|
||||||
# Microsoft Defender ATP production deployment
|
# Microsoft Defender ATP production deployment
|
||||||
@ -89,9 +89,9 @@ the following discovery methods:
|
|||||||
If a Transparent proxy or WPAD has been implemented in the network topology,
|
If a Transparent proxy or WPAD has been implemented in the network topology,
|
||||||
there is no need for special configuration settings. For more information on
|
there is no need for special configuration settings. For more information on
|
||||||
Microsoft Defender ATP URL exclusions in the proxy, see the
|
Microsoft Defender ATP URL exclusions in the proxy, see the
|
||||||
[Appendix](#Appendix) section in this document for the URLs Whitelisting or on
|
Appendix section in this document for the URLs Whitelisting or on
|
||||||
[Microsoft
|
[Microsoft
|
||||||
Docs](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection#enable-access-to-windows-defender-atp-service-urls-in-the-proxy-server)
|
Docs](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection#enable-access-to-windows-defender-atp-service-urls-in-the-proxy-server)
|
||||||
|
|
||||||
**Manual static proxy configuration:**
|
**Manual static proxy configuration:**
|
||||||
|
|
||||||
@ -578,29 +578,29 @@ Protection in audit mode.
|
|||||||
|
|
||||||
1. In the System Center Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Endpoint Protection \> Windows Defender Exploit Guard** and choose **Create Exploit Guard Policy**.
|
1. In the System Center Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Endpoint Protection \> Windows Defender Exploit Guard** and choose **Create Exploit Guard Policy**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Select **Controlled folder access**.
|
2. Select **Controlled folder access**.
|
||||||
|
|
||||||
3. Set the configuration to **Audit** and click **Next**.
|
3. Set the configuration to **Audit** and click **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
4. Confirm the new Exploit Guard Policy by clicking on **Next**.
|
4. Confirm the new Exploit Guard Policy by clicking on **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. Once the policy is created click on **Close**.
|
5. Once the policy is created click on **Close**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
6. Right-click on the newly created policy and choose **Deploy**.
|
6. Right-click on the newly created policy and choose **Deploy**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
7. Target the policy to the newly created Windows 10 collection and click **OK**.
|
7. Target the policy to the newly created Windows 10 collection and click **OK**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
After completing this task, you now have successfully configured Controlled folder access in audit mode.
|
After completing this task, you now have successfully configured Controlled folder access in audit mode.
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user