diff --git a/windows/client-management/mdm/defender-csp.md b/windows/client-management/mdm/defender-csp.md index 73237ce6c0..88a8764d74 100644 --- a/windows/client-management/mdm/defender-csp.md +++ b/windows/client-management/mdm/defender-csp.md @@ -10,7 +10,7 @@ ms.prod: w10 ms.technology: windows author: dansimp ms.localizationpriority: medium -ms.date: 08/05/2021 +ms.date: 10/04/2021 --- # Defender CSP @@ -73,7 +73,7 @@ Defender --------SupportLogLocation (Added in the next major release of Windows 10) --------PlatformUpdatesChannel (Added with the 4.18.2106.5 Defender platform release) --------EngineUpdatesChannel (Added with the 4.18.2106.5 Defender platform release) ---------DefinitionUpdatesChannel (Added with the 4.18.2106.5 Defender platform release) +--------SecurityIntelligenceUpdatesChannel (Added with the 4.18.2106.5 Defender platform release) --------DisableGradualRelease (Added with the 4.18.2106.5 Defender platform release) ----Scan ----UpdateSignature @@ -124,6 +124,7 @@ Threat category ID. The data type is integer. The following table describes the supported values: +

| Value | Description | |-------|-----------------------------| @@ -399,7 +400,7 @@ Supported product status values: - Service started without any malware protection engine = 1 << 1 - Pending full scan due to threat action = 1 << 2 - Pending reboot due to threat action = 1 << 3 -- ending manual steps due to threat action = 1 << 4 +- ending manual steps due to threat action = 1 << 4 - AV signatures out of date = 1 << 5 - AS signatures out of date = 1 << 6 - No quick scan has happened for a specified period = 1 << 7 @@ -722,6 +723,8 @@ Current Channel (Staged): Devices will be offered updates after the monthly grad Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%). +Critical: Devices will be offered updates with a 48-hour delay. Suggested for critical environments only + If you disable or do not configure this policy, the device will stay up to date automatically during the gradual release cycle. Suitable for most devices. The data type is integer. @@ -730,10 +733,12 @@ Supported operations are Add, Delete, Get, Replace. Valid values are: - 0: Not configured (Default) -- 1: Beta Channel - Prerelease -- 2: Current Channel (Preview) -- 3: Current Channel (Staged) -- 4: Current Channel (Broad) +- 2: Beta Channel - Prerelease +- 3: Current Channel (Preview) +- 4: Current Channel (Staged) +- 5: Current Channel (Broad) +- 6: Critical- Time Delay + More details: @@ -751,6 +756,8 @@ Current Channel (Staged): Devices will be offered updates after the monthly grad Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%). +Critical: Devices will be offered updates with a 48-hour delay. Suggested for critical environments only + If you disable or do not configure this policy, the device will stay up to date automatically during the gradual release cycle. Suitable for most devices. The data type is integer. @@ -758,19 +765,22 @@ The data type is integer. Supported operations are Add, Delete, Get, Replace. Valid values are: -- 0 - Not configured (Default) -- 1 - Beta Channel - Prerelease -- 2 - Current Channel (Preview) -- 3 - Current Channel (Staged) -- 4 - Current Channel (Broad) +- 0: Not configured (Default) +- 2: Beta Channel - Prerelease +- 3: Current Channel (Preview) +- 4: Current Channel (Staged) +- 5: Current Channel (Broad) +- 6: Critical- Time Delay More details: - [Manage the gradual rollout process for Microsoft Defender updates](/microsoft-365/security/defender-endpoint/manage-gradual-rollout) - [Create a custom gradual rollout process for Microsoft Defender updates](/microsoft-365/security/defender-endpoint/configure-updates) -**Configuration/DefinitionUpdatesChannel** -Enable this policy to specify when devices receive daily Microsoft Defender definition updates during the daily gradual rollout. +**Configuration/SecurityIntelligenceUpdatesChannel** +Enable this policy to specify when devices receive daily Microsoft Defender security intelligence (definition) updates during the daily gradual rollout. + +Current Channel (Staged): Devices will be offered updates after the release cycle. Suggested to apply to a small, representative part of production population (~10%). Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%). @@ -781,8 +791,8 @@ Supported operations are Add, Delete, Get, Replace. Valid Values are: - 0: Not configured (Default) -- 3: Current Channel (Staged) -- 4: Current Channel (Broad) +- 4: Current Channel (Staged) +- 5: Current Channel (Broad) More details: @@ -830,6 +840,6 @@ Added in Windows 10, version 1803. OfflineScan action starts a Microsoft Defende Supported operations are Get and Execute. -## Related topics +## See also [Configuration service provider reference](configuration-service-provider-reference.md) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md b/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md index 40a53c2736..605dfd0cfd 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md @@ -1,5 +1,5 @@ --- -title: Network security Allow Local System to use computer identity for NTLM (Windows 10) +title: "Network security: Allow Local System to use computer identity for NTLM (Windows 10)" description: Location, values, policy management, and security considerations for the policy setting, Network security Allow Local System to use computer identity for NTLM. ms.assetid: c46a658d-b7a4-4139-b7ea-b9268c240053 ms.reviewer: @@ -14,7 +14,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 04/19/2017 +ms.date: 10/04/2021 ms.technology: mde ---