22806 Commits

Author SHA1 Message Date
ManikaDhiman
4991505985 Added new IsStub node details 2019-09-30 15:53:14 -07:00
ManikaDhiman
2dae196a2e Merge branch 'master' into MDBranchTask3629829EnterpriseModernAppManagement 2019-09-30 14:56:37 -07:00
Thomas Raya
72e94b39d6
Merge pull request #1240 from MicrosoftDocs/user/tudobril/catalina-updates
Catalina updates
2019-09-30 14:52:05 -07:00
Rebecca Agiewich
ebaa76748f
Merge pull request #1239 from MicrosoftDocs/SKUTransformBranch3
SKUTransform (horizontal --> vertical) last 29 files
2019-09-30 14:29:18 -07:00
Tudor Dobrila
2ee8c16393 Update to JAMF 2019-09-30 14:12:23 -07:00
illfated
fdeedb73f7 MDATP Get started 404: link Overview page instead
Description:
As reported by a new community user, the "Get started" link is broken
and causes a 404 error when trying to open that page.

As discussed in issue ticket #5053, it will be useful to make the link
point to the MDATP Overview page instead.

Proposed change:
- Rewrite the link name from
"Get started with Microsoft Defender Advanced Threat Protection" to
"Microsoft Defender Advanced Threat Protection overview"
(the name of the link can be changed depending on feedback from MS Docs
 team members).
- Link the main page "Microsoft Defender Advanced Threat Protection"
instead of the non-existing "Get started" page that causes a 404 error.

issue ticket closure or reference:
Resolves #5053
2019-09-30 23:07:43 +02:00
Raaj Baskaran
fb9518601a
Merge pull request #1237 from MicrosoftDocs/SKUTransformBranch1
SKUTransform (horizontal --> vertical)
2019-09-30 15:47:19 -05:00
Tudor Dobrila
a7dd24871f Catalina updates 2019-09-30 12:56:07 -07:00
officedocspr
bdb7da535b Merging changes synced from https://github.com/MicrosoftDocs/windows-docs-pr (branch live) 2019-09-30 19:35:01 +00:00
ManikaDhiman
5f9c0f4e1f Fixed typos 2019-09-30 12:12:30 -07:00
ManikaDhiman
71de449f39 Fixed typos and removed en-us 2019-09-30 11:59:25 -07:00
ManikaDhiman
6608919e0c SKUTransform last 29 files 2019-09-30 11:45:28 -07:00
ManikaDhiman
2e07b9ffa0 SKUTransform next 30 files 2019-09-30 11:42:38 -07:00
ManikaDhiman
3777c2ea54 SKUTransformFirst30Files 2019-09-30 11:38:46 -07:00
Daniel Simpson
eb457c2b20
Merge pull request #4939 from mosubram/patch-1
Need to update the policy path details under the section "Use Group Policy to manage the update location"
2019-09-30 09:57:26 -07:00
Daniel Simpson
8cd5714c36
Merge pull request #4969 from mardahl/patch-1
Update enroll-a-windows-10-device-automatically-using-group-policy.md
2019-09-30 09:55:08 -07:00
ManikaDhiman
b31919846a minor update 2019-09-30 09:52:14 -07:00
Manika Dhiman
ae1e862cf3
Merge pull request #5009 from ShrCaJesmo/patch-1
Schedule task hidden from standard users
2019-09-30 09:38:30 -07:00
maximvelichko
ac3a8e1c1e
Update microsoft-defender-atp-mac-install-with-intune.md 2019-09-30 08:46:03 -07:00
Raaj Baskaran
5365c5cc51
Merge pull request #928 from MicrosoftDocs/lomayor-wtp
Web threat protection - please merge
2019-09-30 10:19:15 -05:00
Raaj Baskaran
cad84f8d01
Merge pull request #1233 from MicrosoftDocs/maximvelichko-catalina-fda
Maximvelichko catalina fda
2019-09-30 10:19:01 -05:00
Raaj Baskaran
40c496625d
removed locale 2019-09-30 09:54:57 -05:00
Raaj Baskaran
5eb0e6716c
removed locale 2019-09-30 09:54:31 -05:00
Raaj Baskaran
6ff292fa71
Removed locale 2019-09-30 09:54:04 -05:00
Raaj Baskaran
46c344a777
Merge pull request #1232 from MicrosoftDocs/user/tudobril/mac-pua
Add topic on PUA protection
2019-09-30 09:48:51 -05:00
Raaj Baskaran
a52ec03954
Fixed Typo 2019-09-30 09:43:24 -05:00
Raaj Baskaran
51dd88d35d
changed http -> https in Apple (non blog) link 2019-09-30 09:41:17 -05:00
ImranHabib
1c20fa86d3
Update in security settings
In the document, the third option was confusing and updated to Enabled Microsoft network client: Digitally sign communications (if server agrees).

This is also placed in the rest of the policy sections. 

https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-always

https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees

https://docs.microsoft.com/en-us/windows/security/threat-protection/security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-always

Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4883
2019-09-30 08:58:50 +05:00
ImranHabib
9c3eee5471
Detailed explanation of level
As the user suggested, I have applied detailed descriptions of levels. 

Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4577
2019-09-30 08:42:01 +05:00
ImranHabib
57dcc21089
Update windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2019-09-30 08:28:35 +05:00
ImranHabib
8924116703
Update windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-29 19:07:21 +05:00
ImranHabib
99fa2ef07f
Update windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-29 19:07:10 +05:00
ImranHabib
a1009d8c7c
Update windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-29 19:07:02 +05:00
ImranHabib
1988d93b9f
Update windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-29 19:06:54 +05:00
ImranHabib
83dd94f493
Update windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-29 19:06:47 +05:00
ImranHabib
732026c25b
Update windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-29 19:06:38 +05:00
maximvelichko
e31094e7cc
Update microsoft-defender-atp-mac-install-with-intune.md 2019-09-28 14:18:49 -07:00
maximvelichko
7b9a5f07b1
Update microsoft-defender-atp-mac-install-with-intune.md 2019-09-28 14:17:06 -07:00
maximvelichko
0979d0e0fa
Update microsoft-defender-atp-mac-install-with-intune.md 2019-09-28 14:15:19 -07:00
maximvelichko
cca18b0cb7
Intune 2019-09-28 14:04:08 -07:00
maximvelichko
46aabb7f8b
JAMF 2019-09-28 13:03:49 -07:00
maximvelichko
30097b1fe0
New JAMF image 2019-09-28 12:44:25 -07:00
maximvelichko
d7f6ea53d1
Replacing JAMF images 2019-09-28 12:42:08 -07:00
maximvelichko
d11026c230
Catalina, Full Disk Access 2019-09-28 11:50:10 -07:00
ImranHabib
f498ca39b7
Update windows/security/threat-protection/microsoft-defender-atp/custom-detection-rules.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2019-09-28 09:34:03 +05:00
lomayor
5c0772f67f Update web-protection-response.md 2019-09-27 18:39:28 -07:00
lomayor
7a29fe71b0 Update web-protection-response.md 2019-09-27 18:36:12 -07:00
ImranHabib
8da4466dc8
Added a note
ATP doesn't need any specific diagnostic level.

Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4824
2019-09-28 06:08:32 +05:00
ImranHabib
c9871554bb
Added query as example
Added query in the document as an example.

Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4904
2019-09-28 05:43:15 +05:00
lomayor
b2ceec8f00 Fixed NP links 2019-09-27 17:42:43 -07:00