From 724a312daca11d7076f2afe0b661d4206fec1b69 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Tue, 12 Dec 2017 14:43:26 -0800 Subject: [PATCH 1/4] typo --- .../customize-controlled-folders-exploit-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md b/windows/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md index 0d8c59314c..ac6af59799 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md +++ b/windows/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md @@ -119,7 +119,7 @@ Use the [./Vendor/MSFT/Policy/Config/Defender/GuardedFoldersList](https://docs.m - ## Allow specifc apps to make changes to controlled folders + ## Allow specific apps to make changes to controlled folders You can specify if certain apps should always be considered safe and given write access to files in protected folders. Allowing apps can be useful if you're finding a particular app that you know and trust is being blocked by the Controlled folder access feature. From 92f47962a3828432b165e054cced5b5a63c6970e Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Tue, 12 Dec 2017 14:58:23 -0800 Subject: [PATCH 2/4] add note/image about hiding all pillars --- .../images/wdsc-all-hide.png | Bin 0 -> 14795 bytes .../wdsc-app-browser-control.md | 7 ++++++- .../wdsc-device-performance-health.md | 4 ++++ .../wdsc-family-options.md | 7 ++++++- .../wdsc-firewall-network-protection.md | 5 +++++ .../wdsc-virus-threat-protection.md | 7 ++++++- .../windows-defender-security-center.md | 5 ++++- 7 files changed, 31 insertions(+), 4 deletions(-) create mode 100644 windows/threat-protection/windows-defender-security-center/images/wdsc-all-hide.png diff --git a/windows/threat-protection/windows-defender-security-center/images/wdsc-all-hide.png b/windows/threat-protection/windows-defender-security-center/images/wdsc-all-hide.png new file mode 100644 index 0000000000000000000000000000000000000000..98083a937c539295dd57043ff00b2eede4bd463c GIT binary patch literal 14795 zcmeHu1ymf{nr=1j3D9tGZ3w|#5*!*D3lcOyAh>&wkff2IK^xZqAp{8S79_X_4NmYt zf_spDeeRuiCOPx2oHw)Hoj2?3TK`_FdROiG_piI^`x`lh{0!VwR!~v^K&Yb?bpXg~ zfL;|UBhR31X>Q}>?BHx|Yw6CQHygzj7U!Q{P0ObGx2ov;|2K-wCp`l}7VqxRp;^Bh;^uLaw z`oE6;FnAL{1EHg%VW4ATVql=Ad4?JTFo-cp82MzdNHrf}Gr5BK{bRFnm}Se`$h1cG zAOdD?0l0YNzfe$8v9R7^yUi{rBrGB-c1KPgs-Or{QogUPqpPQH@W9-{(#qP#*3RAI zv8R`}&y&CxLBS!RVd03l_=LoyFpaG z8=si`G&Mc5w7jyqw!ZOYb8G+L@aXvD^z8gQF^Xk03=DJ(>|a?1p?RSQofrd?kq?VR zMicvyD=8DdKMq(nHoLqHmsvn-kIc+%1dkjdxWuymE7yNv`k&)D;Qxy0-+2CwWn?Qr zj02(qeMJW`0cgY^bYc*41|UEOp-#|=0V&|Sm-NS~O^;bcUqdUa8vm43ie5-pE<$+~ z;R89aH@qg^7P)@L1>fy3xm3Fq0$-)HMgkAZ;9qh}Zgi$Dyv;M|HMhP^$Pb0%u;t?W z@(#jrM3F#ZBZF#snTUJ=1;v6pBK`fwzGP|r@IB(y=!Ryp5l=;5B!F|0h6E%NTTYjG zu34kc6pz}F0QbM0Hf;@ei9}ZDyNZnykj(lFX$c0Le7AAD)|Or5YEWc#Gw3H1T`H)( z7HVpUWH70m?yH#L>>hdqiTEB?*%U~cRsL2I>Z(;!oC0e)xw|{<7N3p>=z`k z7j4^exM`0Bo--kVWg8^$!dDFmyizf_*#89ykQ$L($|G1VRQG4o9Gg7?ZX2vuzqnT> zTCbMH*_Nw|$1CNgDS@#lBUuT0M!E5Y=Unw zY$P2@y$^v%B}%#79X?a6T0B3hMglFw@O?q}2dO+HF#M+U>g**F2rCij_#Rd}o)>wH zJr>lQ9@kp94;)t2;tyys3!WdWm~i=s&D2?8mG4|WE>t62Yx3N5l&DT$%b3CnU*>?O z_n33lbr{zupjD!gO(j5X5A&?UeTiUj&gZL7OfH$fTVH;EfCLspTh3CYmgvUd8>64D zFQG`F<5PMxjq#?euX<%zaGKr4{QBJmeMj<*K`usqK@vXV!0OzM0f?Wr!NjE{+?wXZ z?WKx+eo&W{Z3e?sV%Z#9WVrK%45=SD!t7Rz#Z$i@*Sm<)=TGaE_;J0Z!Xe9qtHixj zvtdCQdF!?iT;{&S*x~h>dru1tI!p@%(4Mv@^hHH?)_T?G@~UxeI_SJKhLCn+Ao3Mh z94+gO-^48SiOR7DG>*NdIk>hyEn5va=-yF8Df0JL^@G%fTBSM+%u<)kYxoTxbalJe zMVaYRtQq9W^?kTDCD7#`@v~$o(ecRLe`oM~YpG~8`6V-DfSGyPwqCK_GS{NOIXhXJ z({uOW863gC*i<`$zMsCH*7=fo#`$kbIQ8M#*nJylhuOl!f=~iJY?!3|>b0|7mxhkZ z8f|jjU2`o(h*Qa|{64`<@m!5M$?Ius!<-_Rf$9sxLJKrq8|)c=A8qgMyHP|waDj^{ zH@S23Q)a!NoRa=$leQoJyw6uL_Ub|6=1%F!va!@tCECWOO=8^;(?p?aP7K6d%XoqE zc5VpWopIq1;g9T{c*BxbViqFN_Q|r?nsq$MIf{L+=4+*R#nvu|cOUiMSc{&EI{dqj z9KwzkqGqZ&=*FCHH(I>SSDV;uT)h}mM))n;39rml|FZ&dijrIV$EQ*SMqA}dt}d}1 z0Y1wwm<9M?RtVZrOKE~G{#iXn8KC?}(UQVH{A4z-f8xPGQ&GGni98dv`+0*jp$j32@v$KN*w)->+?9ffSdBEIc&)n7>ZIx9cEo0SE+dOewxxIOO6=-k6z2j}5g zl@#v2{&n29voTf}ysdz#IY3~lSA6E$zp3lcQ7QDM9+Hkwg(*P}l(v+<{@`>mEk8$| z|By`ov1?oj{I<6+_a1Vtob6<3LUiZjN>{)tx@>!->b)z-VU!|1YkftUfxO<+WSwxV zIW@OWJOz~{C6v&KdI;3%l?bBdT}G)>yE|7m&)wZaVSXRJAG}>r?su|k_T3+hC!d+< zaOsN8IoH?L(V-0BcL4wkgnB(|b9!l-I2;Ku_P@G7`Em|ZsX2FihQUMi&(BN_<@XOM zpjweRNzDyBYq7fzX^}vT<*TbFsGUm=qB_E^+ZBkx=|vY6?HSH)?b-D=ko@V28vE{7 z-8}nJgPEOD0a8mQ2&S6~d@nSs07=bOlLl-W%Bs@{X9}TN;Z4 z*YN|pPO_A2pgPEFS&+_lAX(>p_}%^?y?ZLvm2@CtD=wl-Ei*J1<3}18 zBoE{`UkY?ZLg22`+7(Ekp~Di6#wJ`=nWAcAVL7E=xWjQZI@N1p=DK}n0L7qu7B4pQ_ z4%W^!u9{py6&UznWv1aoG`8uuxZ3C>2%2j|Y-%kOke)27h_{e^qa34sQ~N+W!W`p3 zQBFs2o}EizkT1!rKE9t5anm?CNQV+6t-qojB?MqXY40hG=J;`>iQ-oUi=Os08rN`d z7@6DCSSHb!u9_uqF-FQlYznbHW@`gks{qg?Fm%T{H8UJ2n$+Fxhf>pCTeH1AP42o@ zTx>=6T4?RE`;ada1X8?(9;MWK+1q>iCdUtt?LSWfCeSiZ?vu%H18z#e{7Mo^EN)82 z#bg?O>=B?=bU*BBE-;`81p`4c44*ALP6nwJ+@qdYH{Z6<h%|M*^22-0(KD# zxZfM9HTSh(ODhsM%Fh%wzhpxKk?>7^iLdP~2LzQ!pj2P#NK1EExodCtGLRDqe4V^; z1x|=w3Gy!j>c~6ASCK$;-FhPDQu#rv+|Jj)Q|Tcerlx{RH`J#1a(Zj*jQN`EoVh%w z`SC&3;?9>>XW02jU|(munUc69#fkCYg)h+}qXn$I?y58CG+ZJreWQj$K+ZFqEeq}c zCH+?jY0%u;>slree*6{tI$U|WlpRjf(t!kopHyArAc3IgFt(iVfsd#T_>a_dh}_POToC49s39Gso(rAg7sw(`(#roPlXXKjCrd<=xkz;j0prgf zK!0V#?dG~j*~vWLMu~U8RBq}=uHh9MQ+Mlb=qitvSSO&L^RC|uv-#;XiMZp?x=z=( zpdnb-GLDH6jmKMcSF*zMxH}ywT^pvaZ)No|SbW47*Cj7qRv{!TMjYrwEUGeu#0IR< zsm8@tqjgQY9|Y(;DZ_T*WoC}C0ofGpKa}C8WQwIFWlS+pF1fQBAl?1+=&hnVxX3(m zBtx1-$Dcuj9fr+7+#_+r4oD3THIg5tkSmCl=JXH#d_z`G3^;+@C*Q$(MAZ{CMN&wq zax*uW!5V^w1My%8lqP2@a`ZB(+?%hR<(X6bB?T;(r!vSc??(`EIfPFa-k4EVsAeUz zoSZwcBiMZ~if^x?l2FG_SmKmh7s1ej2ONO3D0b!}2;4xEng+!_{EJ*!p%hf)F@x(_ zrdwM%Qq0s-{N>Jqw1oe^M}oY z0%Pxn>i%RN261eU1fMiM6s!UIqhuoNjRdaclB7;hDOw(CqV#DnQwo(t)`qXjk-!MC zUS$%T%H%WryS6$t-!&NC)pC?Vcf7QCj%9!ZJ{8e_zs+G)-gFlUF!W1(KMq6!P!@+z z2~tre%kVUb2XGAdhZYD}6KZ9H>VV%9KXl=ZOqUGhQBRkB*Cp-pOJ^)w-D}#(NA)!= zV{zZwm@Dg3xC8ibC8}beOt8ulnt;A9-};#fC?$uXz|;DDvbAyUYOISpvnDe}51z$C z^HhZ9JNT+Axu(Wp(-?LJV-}(o2h&ECl4E1`k`&bwEc=fK=d&^&kvvOS;2$VT)pjU# zfSp^A_#bv2?&@f{W!-p|<0sCeytmyFD&!kh{Z7*>16|qVD7im7_Ik>y)wOnro?HL< zzKDyS>kw8rLjWz+ZfDKG+-7ffJDAJWnQL5Q5nIyh6;70FTrW1FT!r1@MJ!n$3H9b3 zHuUwdBT=rSLCI5%3iCWe?*QBEC|})F6=PP5di~g?+mQ0vloT3Sy;GYJXXtd$@vBhX z!+9IkM9qFdNym3aGES6MiJjJAB{^YwLh@!rKJa zY_Xa|ausv4ul&Yyci4wd!XD7y_Ufv?FLv-u0Y5A(W-gp&}D(Cfs>#|~jcW{>%BCJc0R*OG#lYCdvSvu!Ke*)Nm9#pOS& znLo3G%{k4kb7IXW^Scs9z9jB7Kgs}u)?3I0dyWY~Gb*lLC-yJJPR=FWi(D6^KM{nI zB`?n@H8F6G>=@mIiIOkSjy{!JrY^9oidwmMhb3SpH-;EcOgv>0%^=g95cUruQ7HDW z5|JE38Pvv-p}|`y25gLYPwu194KM@Wo^CrA_&s81gSiq3zPBII1J z7zt3KN&F}=F_-9~N@)==q!LCo!>Vu|M@+^+?M_7|3o;^#x6vTf{^|p-qL#6)W$r)d z$TM|~*qw9Dn40Yp7++Zh^pc};!66Y^Am z?A)E|D)?^wTB=eW^H0}L3_sv- zCbh$-@oeuc3x6g?)f#G%Vi~WGAA+VS$!vr3REFIN0Vcsst^wtqRcZz=%$GWGJ-`vv zf6VbNFI;WFWB?@F&0z}o=ekgoV?fNkaX??I^nzO=9;cleLK8W}imO#9EMkjOFv{jX zjK1)uTAShIWmq>JWo-`~lG%K;|Lmx;Q{+3(^sVu=vF8IKSH%R*oDbb4uin(kTX{c? zt(guye-TlJoreH=KjYo`l*awW_uZM~hSs=v0%BJ+(-MZx-c@SXaogIHbG{$QvUVbx z@8*{xx1*AM7O-9XV%Yv|ug%9c!QAS872;an^R~R0XBnv?B(f2>+&6g`=;{@f52&T+ zOy(X;FWxJgHE61A^KxAiFRW;P;>diT>K+x&MjMmkr`zB+=J2Eq3Eh?w@5x7Z_}S}ou5*o|4!!y^d$OLKbGjoYfn8-mXku->1IZ$nWCWhn1u&MYUa)Y5RxwRg~E!4 zK}ajJqxYJMD?#xZ0upOT0UXD)Q(~BZs%8^g)f=ACt@m=wmb2P*%bS$)>NG~Vihg^H(mQ>h@M}%u zeO#_G<#-im8O+f9eCecDvfq?ajaK)+_tG2TaeDZv|9x#sT{wlvc}z)a7IxdMp0{iz*IMu}CBk;@FRPT^m@~4Sxi4{C)bK*L#;vdGi}d>74tKVKPmaAmsX_sb zqYIuAhho$DLu2dtvzMCH&CWONZpvDgk36ufnyt%?^x?#Ut&!g8V8KDaTn1vUH`CaS z{GNeiL`!d1?@P9bmrV=m?)AHRn<}kE6jqs-rEaDhc0U&2=-Ph)dW+A_UpG5wVSF~M zIdL=_8bAG@iOO>Bl#3@>*DA`lk-zK)AA#mhjV+xbfAZy2oV{BI`mD@RPLs9VzGvQ; zq3xt+KTC1em}4F%Sb(duh@@#*H$%LI%aWS;faS2M9<9y{?SzhQ-1&H$N@cd-QMK=j zblJV^&N^L$P{Ke|-#6hf*a!B5w+v2ML^I)g{l?GLab^eY${M$3i%66tKXI*9eb~|q z;?WyS!4tRxdx+Zi53c3M#uNo+mF??R!o?q0ggHL)&|0@nT*Bupm*JPs)Fz&L#jUWI zl2Ag^78Utk+3!gP*@lL9p8*wHTF;^7M5)J#^t~mrA}==%%=wJ9M`3AF+@E^T-9B;T zpM~hWQjXTLs;+IW`?y=WoXWN;Wv#7p>tI}P)~GgFzo!+`G+B!*(9ic7*?M3nRYLKM z&B0ZsZ)0$!y{)DJiHZ+8^|b19^Nh)5$|sTnTy;{uuT=j1o%dh+KFXe+`mCtg2EmqW zAO~%Iv z6;96-H>G)XFhnprTm&UK;i@k|EPc(2+jFN4*bY!nHUr#4%1QbZzsd7 z^na+HHNPqRMEVmm-=cRghgcpeE2m91!VF4GZF&#QaT&ZX6CyZm0B9>l(E`u-_9$%I zne&)w&pNK2aj$>_TZuU~6EL=zC(fq=capLkf6qTu`i6N3w5;~kw#IB5%>~ADyN>V+GTA~W{ETdA4S~ok zB0oHRK|_3bJ{d<0%?gTX5{M4lz(9{S8zyB+n2{q(a%^wuUBt=0kTDCqdLaF4!Ln1i`0wQgzfOM2BC1Hw6)qGr{qU(i5cP} z%(2uOhiM+K0(bBZX4NUT^dz9RLRO#0UyrNPa@Tz9w>KosY{!`-i|m^U6Nnz;r$Wmi_DZ zuAt_z$@Q5J6dox~@aJifW1^V?B&1A^uow0%{qwAwufJf?pnoi`;^LpHnw+c|Nf|S* za#bLRt!2?KyzH5Wi4l&khY3F8<7RI3^?l^#2PG(`G1CEP3#eo39(g(Hh!ajx4EjJr zUJA*-4^*wX2_b)%*S@B_$E;4)*~G({)q6)ho~R!P#wA`28VQ4h9vn-Nn=}!txL{sq zKgw@otEtf+&_~Q5fqq^!Fd}7{k+QGMFe|^cy?#Xtv_1Kq?v*uPL%__!?dg<=0cBuwcVM0S1tNVJi=rb%Q3P+R6&;zeLOFxaE@ip*>+P-YA zPSlEWb>cf4I+G*1TBcyIp`lmQEn8wLioV>a&Ws7=&jOX?Zdm$=drAezw5`na8AIjrUo37AINa<}foYR5IGY*lpQgpd4cd=L zQ(DW84eZZT+rz7*vze0mq6Z@Ng0!DC#7L9H-PJ&Sd0C*?P92?U zbDGVGXs3it9T@!L1dbc`!|fe%Hx$&svOeJonIYVr&bm;!sk)%$lN-c_`>e6DEMdsK zYJ0O&{VKzb?0)Y{2iIgBPi}HnJSrBHCIj*<=x^iI)8N%Z0e9U@ihwZ{ z%|tjGT8_ShbcY=4(PFdGb0%zo;`JeA5+UgNI}1=|$OPV11#JPoY#1Gr*{R)(a--f3%K z`fxGC6GLp;Qj7!H(<@f&X`&2VgyVWzyJghEyB4sl!`Vh&xtiq{>X&1_ya~D+idi}C zpIQwC?nmFN4kH%~hQMZ@uy^_EAc5vA0uHz5j{BYK!bE5X ztHGAFSiP;QJD>`mInY<#FIiaPwyYxgj=8)&*ccwn5;)%!nG(#kS>gdh%us;T-#=~< z-9K~gets5CWRtZRRLpc^jizFSzxQO(U~9g@D~F;39J3q3;$1lPPdye~6T2O! zI}K6R?(rULR@v4vQcgvDY{0@&Yh^g5=SvZoo|A9MeKS3EG;8e^XkmnYD*`pc7(PqsVoDN+S5pfTkyc=PxH zb242!&Bu1(Krn|*aW5Z}f;zTcP*1Ou3--PM{X5d})YNb`AmsX)lE`nCN==0)3C}Gr)s>FLw9} zg?M$hbVZ-RHm;Z9D~l^eS76Xb_yAhXkmkmY82%grV+(N4g*Psx4DjaC19s zV|FIQ^&!O4A*0Fsw}kh79EzA3<9!ecmL8^A1SFu%mjBb-4zJF;M(7=BEE5!QGklyd`nbF6G)~HgWRWWxY-~d08*ZH=#*p+lff1NcGzw(ypIGU#uX3iYy|t@J&?t z2$l2smeg+abzk()gY}f+QobZ}4-AYU#3tk zF~;D-nn>U&{6ri6L2&VK9KJ|@l>oSd|K1>(Q~R}~84@UYdD-do!)+?gONSU?w~~pv z2qWu;h+I$e(ck>D{`%k7SO2JQ|A*_(D^c*`0Zly;sFC{4#Qy!>&w2QLdgIwB5hT0;g_GK0x9-C5JF)B(Sw0oS14ykg@v$-4 z!P`s7gSVI0#_+{+_*sM064Qj##=+NX)F%KW&^e9-EQilmPWh2Q)zT&6V&os*F>;k8 zwGlnnesPb!m*+jb&WH&+`~$QQKD_qn3JD}3ftRnZNx1G`!?{~_FIz5+>8IVVy{`tO z{+#|#;rwYif722FbgRD;rT&`>=jk-+rRbc<2no#6UlEg;qe}FD3Wz0!TJP)X>U>xe zm1t|$GNzN4q$wc?7XW?A>^%(~nzo&o*xQ}z%H3bS(|HQeQjL#;A5_K7d)gmMA*cTr DJ1thl literal 0 HcmV?d00001 diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md b/windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md index 6ddf83e945..4bc78122e2 100644 --- a/windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md +++ b/windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md @@ -73,4 +73,9 @@ This can only be done in Group Policy. 6. Open the **Hide the App and browser protection area** setting and set it to **Enabled**. Click **OK**. -7. [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/en-us/library/ee663280(v=vs.85).aspx). \ No newline at end of file +7. [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/en-us/library/ee663280(v=vs.85).aspx). + +>[!NOTE] +>If you hide all sections then the app will show a restricted interface, as in the following screenshot: +> +>![Windows Defender Security Center app with all sections hidden by Group Policy](images/wdsc-all-hide.png) \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md b/windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md index 0a7dad3e39..088e882a0f 100644 --- a/windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md +++ b/windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md @@ -53,3 +53,7 @@ This can only be done in Group Policy. 7. [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/en-us/library/ee663280(v=vs.85).aspx). +>[!NOTE] +>If you hide all sections then the app will show a restricted interface, as in the following screenshot: +> +>![Windows Defender Security Center app with all sections hidden by Group Policy](images/wdsc-all-hide.png) \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-family-options.md b/windows/threat-protection/windows-defender-security-center/wdsc-family-options.md index 4c92daa4bf..14ba41602f 100644 --- a/windows/threat-protection/windows-defender-security-center/wdsc-family-options.md +++ b/windows/threat-protection/windows-defender-security-center/wdsc-family-options.md @@ -50,4 +50,9 @@ This can only be done in Group Policy. 6. Open the **Hide the Family options area** setting and set it to **Enabled**. Click **OK**. -7. [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/en-us/library/ee663280(v=vs.85).aspx). \ No newline at end of file +7. [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/en-us/library/ee663280(v=vs.85).aspx). + +>[!NOTE] +>If you hide all sections then the app will show a restricted interface, as in the following screenshot: +> +>![Windows Defender Security Center app with all sections hidden by Group Policy](images/wdsc-all-hide.png) \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md b/windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md index 3ca618996e..66e975a809 100644 --- a/windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md +++ b/windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md @@ -50,3 +50,8 @@ This can only be done in Group Policy. 7. [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/en-us/library/ee663280(v=vs.85).aspx). +>[!NOTE] +>If you hide all sections then the app will show a restricted interface, as in the following screenshot: +> +>![Windows Defender Security Center app with all sections hidden by Group Policy](images/wdsc-all-hide.png) + diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md b/windows/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md index 6c7211c75c..1346ef4193 100644 --- a/windows/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md +++ b/windows/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md @@ -53,4 +53,9 @@ This can only be done in Group Policy. 6. Open the **Hide the Virus and threat protection area** setting and set it to **Enabled**. Click **OK**. -7. [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/en-us/library/ee663280(v=vs.85).aspx). \ No newline at end of file +7. [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/en-us/library/ee663280(v=vs.85).aspx). + +>[!NOTE] +>If you hide all sections then the app will show a restricted interface, as in the following screenshot: +> +>![Windows Defender Security Center app with all sections hidden by Group Policy](images/wdsc-all-hide.png) \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md b/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md index cc41798677..8c998be64f 100644 --- a/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md +++ b/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md @@ -55,7 +55,10 @@ You can find more information about each section, including options for configur - [Family options](wdsc-family-options.md), which includes access to parental controls along with tips and information for keeping kids safe online - +>[!NOTE] +>If you hide all sections then the app will show a restricted interface, as in the following screenshot: +> +>![Windows Defender Security Center app with all sections hidden by Group Policy](images/wdsc-all-hide.png) From 6a426ac8b3f8388bb80054205515c1861c974696 Mon Sep 17 00:00:00 2001 From: Nicholas Brower Date: Tue, 12 Dec 2017 23:23:16 +0000 Subject: [PATCH 3/4] Merged PR 4936: removing last instance of non-implemented policy --- windows/client-management/mdm/policy-csp-deviceguard.md | 6 ------ 1 file changed, 6 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-deviceguard.md b/windows/client-management/mdm/policy-csp-deviceguard.md index 7570724110..bb2b64b977 100644 --- a/windows/client-management/mdm/policy-csp-deviceguard.md +++ b/windows/client-management/mdm/policy-csp-deviceguard.md @@ -180,9 +180,3 @@ Footnote: - -## DeviceGuard policies supported by Microsoft Surface Hub - -- [DeviceGuard/AllowKernelControlFlowGuard](#deviceguard-allowkernelcontrolflowguard) - - From 05c985b6660ad768afdb78295f6951bd7c54e77b Mon Sep 17 00:00:00 2001 From: Elizabeth Ross Date: Wed, 13 Dec 2017 08:52:36 -0800 Subject: [PATCH 4/4] Fixed broken bookmark --- .../controlled-folders-exploit-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md b/windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md index 849b20f6f1..88eeed502e 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md +++ b/windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md @@ -53,7 +53,7 @@ This is especially useful in helping to protect your documents and information f A notification will appear on the machine where the app attempted to make changes to a protected folder. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. You can also enable the rules individually to customize what techniques the feature monitors. -The protected folders include common system folders, and you can [add additional folders](customize-controlled-folders-exploit-guard.md#protect-additional-folders). You can also [allow or whitelist apps](customize-controlled-folders-exploit-guard.md#allow-specifc-apps-to-make-changes-to-controlled-folders) to give them access to the protected folders. +The protected folders include common system folders, and you can [add additional folders](customize-controlled-folders-exploit-guard.md#protect-additional-folders). You can also [allow or whitelist apps](customize-controlled-folders-exploit-guard.md#allow-specific-apps-to-make-changes-to-controlled-folders) to give them access to the protected folders. As with other features of Windows Defender Exploit Guard, you can use [audit mode](audit-windows-defender-exploit-guard.md) to evaluate how Controlled folder access would impact your organization if it were enabled.