Skip to content

Commit 4195425

Browse files
committed
Edits fixing issues
1 parent 4204a2b commit 4195425

4 files changed

Lines changed: 5 additions & 5 deletions

File tree

memdocs/intune/fundamentals/whats-new.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -68,9 +68,9 @@ You can use RSS to be notified when this page is updated. For more information,
6868

6969
We’ve begun to release new [endpoint security profile templates](../protect/endpoint-security-policy.md) that use the settings format as found in the Settings Catalog. Each new profile template includes the same settings as the older profile it replaces, while bringing the following improvements:
7070

71-
- **Setting names match the Windows CSP name**: In most cases, each setting name in the new profiles is a mtach to the name of the CSP that the setting configures. However, in the Intune UI we’ve added spaces to that name to make the setting name easier to read. For example, a setting in the Intune UI that’s named *Allow USB Connection* configures the CSP named [AllowUSBConnection](/windows/client-management/mdm/policy-csp-connectivity#connectivity-allowusbconnection).
71+
- **Setting names match the Windows CSP name**: In most cases, each setting name in the new profiles is a match to the name of the CSP that the setting configures. However, in the Intune UI we’ve added spaces to that name to make the setting name easier to read. For example, a setting in the Intune UI that’s named *Allow USB Connection* configures the CSP named [AllowUSBConnection](/windows/client-management/mdm/policy-csp-connectivity#connectivity-allowusbconnection).
7272

73-
- **Setting options align to those of the Windows CSP**: Options for settings now align directly to those options as described and supported by the Windows CSP, with one addition. The addition is that we’ve included the option of Not configured. When a setting is set to Not configured, that Intune profile does not actively manage that setting. When a profiles is changed to go from active configuration of setting Not configured, Intune stops actively enforcing the configuration for that setting on the device.
73+
- **Setting options align to those of the Windows CSP**: Options for settings now align directly to those options as described and supported by the Windows CSP, with one addition. The addition is that we’ve included the option of Not configured. When a setting is set to Not configured, that Intune profile does not actively manage that setting. When a profile is changed to go from active configuration of setting Not configured, Intune stops actively enforcing the configuration for that setting on the device.
7474

7575
- **Setting guidance is taken from the Windows CSP**: The information about the setting found in the Intune UI is taken directly from the Windows CSP content, with Learn more links opening the documentation for the relevant CSP, or the content page that includes that CSP. The CSP defines and manages the settings behavior.
7676

memdocs/intune/protect/endpoint-security-antivirus-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ The following profiles are supported for devices you manage with Intune:
144144

145145
These CSPs for antivirus exclusion are also managed by *Microsoft Defender Antivirus* policy, which includes identical settings for exclusions. Settings from both policy types (*Antivirus* and *Antivirus exclusions*) are subject to [policy merge](#policy-merge-for-settings), and create a super set of exclusions for applicable devices and users.
146146

147-
- Profile: **Windows Security experience**- Manage the Windows Security app settings that end users can view in the Microsoft Defender Security center and the notifications they receive.
147+
- Profile: **Windows Security experience** - Manage the Windows Security app settings that end users can view in the Microsoft Defender Security center and the notifications they receive.
148148

149149
The Windows security app is used by a number of Windows security features to provide notifications about the health and security of the machine. Security app notifications include firewalls, antivirus products, Windows Defender SmartScreen, and others.
150150

memdocs/intune/protect/endpoint-security-asr-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ Device control profiles support policy merge for USB Device IDs. The profile set
137137

138138
Policy merge applies to the configuration of each setting across the different profiles that apply that specific setting to a device. The result is a single list for each of the supported settings being applied to a device. For example:
139139

140-
- Policy merge evaluates the lists of *setup classes* that were configured in each instance of *Allow hardware device installation by setup classes* that applies to a device. The into a single allowlist where any duplicate setup classes are removed.
140+
- Policy merge evaluates the lists of *setup classes* that were configured in each instance of *Allow hardware device installation by setup classes* that applies to a device. The lists are merged into a single allowlist where any duplicate setup classes are removed.
141141

142142
Removal of duplicates from the list is done to remove the common source of conflicts. The combined allowlist is then delivered to the device.
143143

memdocs/intune/protect/endpoint-security-asr-profile-settings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -223,7 +223,7 @@ Supported platforms and profiles:
223223

224224
- **Not configured** (default) – The setting returns to the Windows default, which is off and persistence is not blocked.
225225
- **Block** – Persistence through WMI is blocked.
226-
- **Audit** – Evaluate how this rule affects your organization if its enabled (set to Block).
226+
- **Audit** – Evaluate how this rule affects your organization if it's enabled (set to Block).
227227
- **Disable** - Turn this rule off. Persistence is not blocked.
228228

229229
To learn more about this setting, see [Block persistence through WMI event subscription](/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction?WT.mc_id=Portal-fx#block-persistence-through-wmi-event-subscription).

0 commit comments

Comments
 (0)