mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 12:23:37 +00:00
Merge pull request #3329 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
This commit is contained in:
@ -343,7 +343,7 @@ GUID: `b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4`
|
||||
|
||||
### Block Office communication application from creating child processes
|
||||
|
||||
This rule prevents Outlook from creating child processes, while till allowing legitimate Outlook functions.
|
||||
This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions.
|
||||
|
||||
This protects against social engineering attacks and prevents exploit code from abusing vulnerabilities in Outlook. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.
|
||||
|
||||
|
@ -66,7 +66,7 @@ The following image shows an instance of unwanted software that was detected and
|
||||
|Microsoft Defender Antivirus engine |Make sure your engine is up to date. Using PowerShell, run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps) cmdlet as an administrator. <br/> In the **AMEngineVersion** line, you should see **1.1.16700.2** or above. |
|
||||
|
||||
> [!IMPORTANT]
|
||||
> To get the best protection value, make sure your antivirus solution is configured to receive regular updates and essential features.
|
||||
> To get the best protection value, make sure your antivirus solution is configured to receive regular updates and essential features, and that your exclusions are defined.
|
||||
|
||||
|
||||
## Frequently asked questions
|
||||
|
@ -54,7 +54,7 @@ Microsoft Defender Advanced Threat Protection, on Windows Server, requires one o
|
||||
> [!NOTE]
|
||||
> Customers with a combined minimum of 50 licenses for one or more of the following may acquire Server SLs for Microsoft Defender Advanced Threat Protection for Servers (one per covered Server OSE): Microsoft Defender Advanced Threat Protection, Windows E5/A5, Microsoft 365 E5/A5 and Microsoft 365 E5 Security User SLs. This license applies to Microsoft Defender ATP for Linux.
|
||||
|
||||
For detailed licensing information, see the [Product terms page](https://www.microsoft.com/licensing/product-licensing/products) and work with your account team to learn the detailed terms and conditions for the product.
|
||||
For detailed licensing information, see the [Product Terms site](https://www.microsoft.com/licensing/terms/) and work with your account team to learn the detailed terms and conditions for the product.
|
||||
|
||||
For more information on the array of features in Windows 10 editions, see [Compare Windows 10 editions](https://www.microsoft.com/windowsforbusiness/compare).
|
||||
|
||||
@ -103,11 +103,11 @@ The hardware requirements for Microsoft Defender ATP on devices are the same for
|
||||
|
||||
|
||||
### Other supported operating systems
|
||||
- macOSX
|
||||
- macOS
|
||||
- Linux (currently, Microsoft Defender ATP is only available in the Public Preview Edition for Linux)
|
||||
|
||||
> [!NOTE]
|
||||
> You'll need to know the exact Linux distros, Android, and macOS versions that are compatible with Microsoft Defender ATP for the integration to work.
|
||||
> You'll need to know the exact Linux distributions and versions of Android and macOS that are compatible with Microsoft Defender ATP for the integration to work.
|
||||
>
|
||||
> Also note that Microsoft Defender ATP is currently only available in the Public Preview Edition for Linux.
|
||||
|
||||
@ -132,13 +132,13 @@ By default, this service is enabled. It's good practice to check to ensure that
|
||||
|
||||
1. Open an elevated command-line prompt on the device:
|
||||
|
||||
a. Go to **Start** and type **cmd**.
|
||||
1. Go to **Start** and type **cmd**.
|
||||
|
||||
b. Right-click **Command prompt** and select **Run as administrator**.
|
||||
1. Right-click **Command prompt** and select **Run as administrator**.
|
||||
|
||||
2. Enter the following command, and press **Enter**:
|
||||
|
||||
```text
|
||||
```console
|
||||
sc qc diagtrack
|
||||
```
|
||||
|
||||
@ -154,19 +154,19 @@ You'll need to set the service to automatically start if the **START_TYPE** is n
|
||||
|
||||
1. Open an elevated command-line prompt on the endpoint:
|
||||
|
||||
a. Go to **Start** and type **cmd**.
|
||||
1. Go to **Start** and type **cmd**.
|
||||
|
||||
b. Right-click **Command prompt** and select **Run as administrator**.
|
||||
1. Right-click **Command prompt** and select **Run as administrator**.
|
||||
|
||||
2. Enter the following command, and press **Enter**:
|
||||
|
||||
```text
|
||||
```console
|
||||
sc config diagtrack start=auto
|
||||
```
|
||||
|
||||
3. A success message is displayed. Verify the change by entering the following command, and press **Enter**:
|
||||
|
||||
```text
|
||||
```console
|
||||
sc qc diagtrack
|
||||
```
|
||||
|
||||
|
Reference in New Issue
Block a user