From 9ee9623a80d2a872729912d4147bd4b646edacf7 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Tue, 17 Nov 2020 22:25:09 +0530 Subject: [PATCH 1/2] updated link for november admx link as per the user report #8655, i so i updated the link --- ...roll-a-windows-10-device-automatically-using-group-policy.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md index a6ac91e10f..a8ec2a4ff2 100644 --- a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md +++ b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md @@ -178,7 +178,7 @@ Requirements: - 1903 --> [Administrative Templates (.admx) for Windows 10 May 2019 Update (1903)](https://www.microsoft.com/download/details.aspx?id=58495) - 1909 --> [Administrative Templates (.admx) for Windows 10 November 2019 Update (1909)]( -https://www.microsoft.com/download/confirmation.aspx?id=1005915) +https://www.microsoft.com/download/confirmation.aspx?id=100591) - 2004 --> [Administrative Templates (.admx) for Windows 10 May 2020 Update (2004)](https://www.microsoft.com/download/confirmation.aspx?id=101445) From 084cb840b0d326f585e0610562b33564d534f28b Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 2 Dec 2020 22:08:18 +0500 Subject: [PATCH 2/2] Update enable-exploit-protection.md --- .../microsoft-defender-atp/enable-exploit-protection.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md b/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md index 4530161e10..7b1c044a64 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-exploit-protection.md @@ -226,7 +226,7 @@ This table lists the PowerShell cmdlets (and associated audit mode cmdlet) that |Disable Win32k system calls | App-level only | DisableWin32kSystemCalls | AuditSystemCall |Do not allow child processes | App-level only | DisallowChildProcessCreation | AuditChildProcess |Export address filtering (EAF) | App-level only | EnableExportAddressFilterPlus, EnableExportAddressFilter \[1\] | Audit not available\[2\] | -||Import address filtering (IAF) | App-level only | EnableImportAddressFilter | Audit not available\[2\] | +|Import address filtering (IAF) | App-level only | EnableImportAddressFilter | Audit not available\[2\] | |Simulate execution (SimExec) | App-level only | EnableRopSimExec | Audit not available\[2\] | |Validate API invocation (CallerCheck) | App-level only | EnableRopCallerCheck | Audit not available\[2\] | |Validate handle usage | App-level only | StrictHandle | Audit not available |