mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 13:23:36 +00:00
increase two acro scores
This commit is contained in:
@ -49,7 +49,7 @@ Endpoint detection and response capabilities in Microsoft Defender ATP for Mac a
|
|||||||
|
|
||||||
1. From the JAMF console, navigate to **Computers > Configuration Profiles**, navigate to the configuration profile you'd like to use, then select **Custom Settings**.
|
1. From the JAMF console, navigate to **Computers > Configuration Profiles**, navigate to the configuration profile you'd like to use, then select **Custom Settings**.
|
||||||
|
|
||||||
1. Create an entry with com.microsoft.wdav as the preference domain and upload the .plist created earlier.
|
1. Create an entry with com.microsoft.wdav as the preference domain and upload the `.plist` created earlier.
|
||||||
|
|
||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
> You must enter the correct preference domain (com.microsoft.wdav), otherwise the preferences will not be recognized by the product
|
> You must enter the correct preference domain (com.microsoft.wdav), otherwise the preferences will not be recognized by the product
|
||||||
@ -117,7 +117,7 @@ Endpoint detection and response capabilities in Microsoft Defender ATP for Mac a
|
|||||||
|
|
||||||
1. Choose a name for the profile. Change **Platform=macOS** to **Profile type=Custom**. Select **Configure**.
|
1. Choose a name for the profile. Change **Platform=macOS** to **Profile type=Custom**. Select **Configure**.
|
||||||
|
|
||||||
1. Save the .plist created earlier as com.microsoft.wdav.xml.
|
1. Save the `.plist` created earlier as com.microsoft.wdav.xml.
|
||||||
|
|
||||||
1. Enter com.microsoft.wdav as the custom configuration profile name.
|
1. Enter com.microsoft.wdav as the custom configuration profile name.
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ ms.date: 04/19/2017
|
|||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This article describes the best practices, location, values, policy management, and security considerations for the **Access Credential Manager as a trusted caller** security policy setting.
|
This article describes the recommended practices, location, values, policy management, and security considerations for the **Access Credential Manager as a trusted caller** security policy setting.
|
||||||
|
|
||||||
## Reference
|
## Reference
|
||||||
|
|
||||||
@ -45,6 +45,8 @@ Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Use
|
|||||||
|
|
||||||
### Default values
|
### Default values
|
||||||
|
|
||||||
|
The following table shows the default value for the server type or Group Policy Object (GPO).
|
||||||
|
|
||||||
| Server type or GPO | Default value |
|
| Server type or GPO | Default value |
|
||||||
| - | - |
|
| - | - |
|
||||||
| Default domain policy | Not defined |
|
| Default domain policy | Not defined |
|
||||||
|
Reference in New Issue
Block a user