mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-15 18:33:43 +00:00
Merge remote-tracking branch 'refs/remotes/origin/master' into rs4
This commit is contained in:
@ -3,8 +3,9 @@
|
||||
## [Windows 10 deployment considerations](windows-10-deployment-considerations.md)
|
||||
## [Windows 10 compatibility](windows-10-compatibility.md)
|
||||
## [Windows 10 infrastructure requirements](windows-10-infrastructure-requirements.md)
|
||||
## [Creators update (version 1703) - deprecated features](windows-10-creators-update-deprecation.md)
|
||||
## [Windows 10, version 1803 - Features removed or planned for replacement](windows-10-1803-removed-features.md)
|
||||
## [Fall Creators update (version 1709) - deprecated features](windows-10-fall-creators-deprecation.md)
|
||||
## [Creators update (version 1703) - deprecated features](windows-10-creators-update-deprecation.md)
|
||||
|
||||
## [Windows To Go: feature overview](windows-to-go-overview.md)
|
||||
### [Best practice recommendations for Windows To Go](best-practice-recommendations-for-windows-to-go.md)
|
||||
|
@ -69,7 +69,7 @@ Each of the features in Windows Defender EG have slightly different requirements
|
||||
| Controlled folder access |  |  |  |  |
|
||||
|
||||
> [!NOTE]
|
||||
>  Exploit Protection - On Windows 10 E3, includes advanced exploit protection for the kernel mode via [HVCI] (https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity).
|
||||
>  Exploit Protection - On Windows 10 E3, includes advanced exploit protection for the kernel mode via [HVCI] (https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/enable-virtualization-based-protection-of-code-integrity).<br/>
|
||||
>  On Windows 10 E5, includes automated reporting into the Windows Defender ATP console.
|
||||
|
||||
|
||||
|
Reference in New Issue
Block a user