mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Acrolinx: "se;ect", "Powershell"
This commit is contained in:
parent
cc8d74f813
commit
dcfe63e866
@ -96,7 +96,7 @@ The result is that DEP is enabled for *test.exe*. DEP will not be enabled for an
|
||||
|
||||
3. Go to **Program settings** and choose the app you want to apply mitigations to.<br/>
|
||||
- If the app you want to configure is already listed, select it, and then select **Edit**.
|
||||
- If the app is not listed, at the top of the list se;ect **Add program to customize** and then choose how you want to add the app.<br/>
|
||||
- If the app is not listed, at the top of the list select **Add program to customize** and then choose how you want to add the app.<br/>
|
||||
- Use **Add by program name** to have the mitigation applied to any running process with that name. You must specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
|
||||
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
|
||||
|
||||
@ -110,12 +110,15 @@ The result is that DEP is enabled for *test.exe*. DEP will not be enabled for an
|
||||
|
||||
2. Go to **Device configuration** > **Profiles** > **Create profile**.
|
||||
|
||||
3. Name the profile, choose **Windows 10 and later** and **Endpoint protection**.<br/>
|
||||
3. Name the profile, choose **Windows 10 and later** and **Endpoint protection**.
|
||||
|
||||
<br/>
|
||||
|
||||
4. Select **Configure** > **Windows Defender Exploit Guard** > **Exploit protection**.
|
||||
|
||||
5. Upload an [XML file](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-exploitguard) with the exploit protection settings:<br/><br/>
|
||||
5. Upload an [XML file](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-exploitguard) with the exploit protection settings:
|
||||
|
||||
<br/>
|
||||
|
||||
6. Select **OK** to save each open blade, and then choose **Create**.
|
||||
|
||||
@ -249,7 +252,7 @@ This table lists the individual **Mitigations** (and **Audits**, when available)
|
||||
```PowerShell
|
||||
Set-ProcessMitigation -Name processName.exe -Enable EnableExportAddressFilterPlus -EAFModules dllName1.dll,dllName2.dll
|
||||
```
|
||||
<a href="#t2" id="r2">\[2\]</a>: Audit for this mitigation is not available via Powershell cmdlets.
|
||||
<a href="#t2" id="r2">\[2\]</a>: Audit for this mitigation is not available via PowerShell cmdlets.
|
||||
|
||||
## Customize the notification
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user