diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md index d694a6c0f7..337cacc79f 100644 --- a/windows/client-management/mdm/policy-csp-defender.md +++ b/windows/client-management/mdm/policy-csp-defender.md @@ -687,7 +687,7 @@ Value type is string.
If this setting is on, Windows Defender Antivirus will be more aggressive when identifying suspicious files to block and scan; otherwise, it will be less aggressive and therefore block and scan with less frequency. -p
For more information about specific values that are supported, see the Windows Defender Antivirus documentation site. +
For more information about specific values that are supported, see the Windows Defender Antivirus documentation site. > [!Note] > This feature requires the "Join Microsoft MAPS" setting enabled in order to function. diff --git a/windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md b/windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md index b9a0e71329..3f98b0d5f2 100644 --- a/windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md +++ b/windows/device-security/security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md @@ -24,11 +24,11 @@ This policy setting allows a client device to require the negotiation of 128-bit - Require NTLMv2 session security - The connection fails if strong encryption (128-bit) is not negotiated. + The connection fails if the NTLMv2 protocol is not negotiated. - Require 128-bit encryption - The connection fails if the NTLMv2 protocol is not negotiated. + The connection fails if strong encryption (128-bit) is not negotiated. ### Best practices