mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 22:37:22 +00:00
Update prevent-changes-to-security-settings-with-tamper-protection.md
This commit is contained in:
parent
2129942114
commit
f615b351a0
@ -39,9 +39,9 @@ Recent updates to tamper protection include integration with [Threat & Vulnerabi
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
In the results, you can select Turn on Tamper Protection.
|
In the results, you can select **Turn on Tamper Protection** to learn more and turn it on.
|
||||||
|
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
## How it works
|
## How it works
|
||||||
|
|
||||||
@ -83,15 +83,19 @@ If you are using Windows OS 1709, you won't have the Windows Security app. In th
|
|||||||
#### To determine whether tamper protection is turned on by using PowerShell
|
#### To determine whether tamper protection is turned on by using PowerShell
|
||||||
|
|
||||||
1. Open the Windows PowerShell app.
|
1. Open the Windows PowerShell app.
|
||||||
|
|
||||||
2. Use the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps) PowerShell cmdlet.
|
2. Use the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps) PowerShell cmdlet.
|
||||||
|
|
||||||
3. In the list of results, look for `IsTamperProtected`. (A value of *true* means tamper protection is enabled.)
|
3. In the list of results, look for `IsTamperProtected`. (A value of *true* means tamper protection is enabled.)
|
||||||
|
|
||||||
#### To determine whether tamper protection is turned on by viewing a registry key
|
#### To determine whether tamper protection is turned on by viewing a registry key
|
||||||
|
|
||||||
1. Open the Registry Editor app.
|
1. Open the Registry Editor app.
|
||||||
|
|
||||||
2. Go to **HKEY_LOCAL_MACHINE** > **SOFTWARE** > **Microsoft** > **Windows Defender** > **Features**.
|
2. Go to **HKEY_LOCAL_MACHINE** > **SOFTWARE** > **Microsoft** > **Windows Defender** > **Features**.
|
||||||
|
|
||||||
3. Look for an entry of **TamperProtection** of type **REG_DWORD**, with a value of **0x5**.<br/>
|
3. Look for an entry of **TamperProtection** of type **REG_DWORD**, with a value of **0x5**.<br/>
|
||||||
- If you see **TamperProtection** with a value of 0, tamper protection is not turned on.
|
- If you see **TamperProtection** with a value of **0**, tamper protection is not turned on.
|
||||||
- If you do not see **TamperProtection** at all, tamper protection is not turned on.
|
- If you do not see **TamperProtection** at all, tamper protection is not turned on.
|
||||||
|
|
||||||
## Turn tamper protection on (or off) for your organization using Intune
|
## Turn tamper protection on (or off) for your organization using Intune
|
||||||
@ -115,7 +119,9 @@ You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-
|
|||||||
4. Create a profile that includes the following settings:
|
4. Create a profile that includes the following settings:
|
||||||
|
|
||||||
- **Platform**: Windows 10 and later
|
- **Platform**: Windows 10 and later
|
||||||
|
|
||||||
- **ProfileType**: Endpoint protection
|
- **ProfileType**: Endpoint protection
|
||||||
|
|
||||||
- **Settings** > Windows Defender Security Center > Tamper Protection
|
- **Settings** > Windows Defender Security Center > Tamper Protection
|
||||||
|
|
||||||
5. Assign the profile to one or more groups.
|
5. Assign the profile to one or more groups.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user