Skip to content

Commit 4ec10c1

Browse files
committed
Fixes
1 parent 4e07296 commit 4ec10c1

9 files changed

Lines changed: 44 additions & 44 deletions

memdocs/intune/protect/security-baseline-settings-defender-atp.md

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -200,7 +200,7 @@ To learn more, see [Attack surface reduction rules](/windows/security/threat-pro
200200
- **Block execution of potentially obfuscated scripts (js/vbs/ps)**
201201
ASR rule: [5BEB7EFE-FD9A-4556-801D-275E5FFC04CC](/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction)
202202

203-
- **Block** *(default)* - Defender for Cloud blocks execution of obfuscated scripts.
203+
- **Block** *(default)* - Defender blocks execution of obfuscated scripts.
204204
- **Not configured** - Return the setting to Windows default, which is off.
205205
- **Audit mode** - Windows events are raised instead of blocking.
206206

@@ -853,7 +853,7 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
853853
::: zone-end
854854
::: zone pivot="atp-march-2020,atp-april-2020,atp-sept-2020,atp-december-2020"
855855

856-
## Microsoft Defender for Cloud
856+
## Microsoft Defender
857857

858858
::: zone-end
859859
::: zone pivot="atp-sept-2020,atp-december-2020"
@@ -886,23 +886,23 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
886886
::: zone-end
887887
::: zone pivot="atp-december-2020"
888888

889-
- **Defender for Cloud schedule scan day**:
890-
Defender for Cloud schedule scan day.
889+
- **Defender schedule scan day**:
890+
Defender schedule scan day.
891891

892892
**Default**: Everyday
893893

894-
- **Defender for Cloud scan start time**:
895-
Defender for Cloud schedule scan time.
894+
- **Defender scan start time**:
895+
Defender schedule scan time.
896896

897897
**Default**: Not configured
898898

899899
::: zone-end
900900
::: zone pivot="atp-sept-2020,atp-december-2020"
901901

902-
- **Defender for Cloud sample submission consent**
902+
- **Defender sample submission consent**
903903
CSP: [Defender/SubmitSamplesConsent](/windows/client-management/mdm/policy-csp-defender#defender-submitsamplesconsent)
904904

905-
Checks for the user consent level in Microsoft Defender for Cloud to send data. If the required consent has already been granted, Microsoft Defender for Cloud submits them. If not (and if the user has specified never to ask), the UI launches to ask for user consent (when *Cloud-delivered protection* is set to *Yes*) before sending data.
905+
Checks for the user consent level in Microsoft Defender to send data. If the required consent has already been granted, Microsoft Defender submits them. If not (and if the user has specified never to ask), the UI launches to ask for user consent (when *Cloud-delivered protection* is set to *Yes*) before sending data.
906906

907907
- **Send safe samples automatically** (*default*)
908908
- **Always prompt**
@@ -913,7 +913,7 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
913913
CSP: [CloudBlockLevel](/windows/client-management/mdm/policy-csp-defender#defender-cloudblocklevel)
914914

915915
Configure how aggressive Defender Antivirus is in blocking and scanning suspicious files.
916-
- **Not configured** - Default Defender for Cloud blocking level.
916+
- **Not configured** - Default Defender blocking level.
917917
- **High** *(default)* - Aggressively block unknowns while optimizing client performance, which includes a greater chance of false positives.
918918
- **High plus** - Aggressively block unknowns and apply additional protection measures that might impact client performance.
919919
- **Zero tolerance** - Block all unknown executable files.
@@ -924,18 +924,18 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
924924
- **Yes** (*default*) - During a full scan, removable drives (like USB flash drives) are scanned.
925925
- **Not configured** - The setting returns to client default, which scans removable drives, however the user can disable this scan.
926926

927-
- **Defender for Cloud potentially unwanted app action**
927+
- **Defender potentially unwanted app action**
928928
CSP: [Defender/PUAProtection](/windows/client-management/mdm/policy-csp-defender#defender-puaprotection)
929929

930-
Specify the level of detection for potentially unwanted applications (PUAs). Security alerts users when potentially unwanted software is being downloaded or attempts to install on a device.
930+
Specify the level of detection for potentially unwanted applications (PUAs). Defender alerts users when potentially unwanted software is being downloaded or attempts to install on a device.
931931
- **Device default**
932932
- **Block** (*default*) - Detected items are blocked, and show in history along with other threats.
933-
- **Audit** - Defender for Cloud detects potentially unwanted applications, but takes no action. You can review information about the applications Defender for Cloud would have taken action against by searching for events that are created by Defender for Cloud in the Event Viewer.
933+
- **Audit** - Defender detects potentially unwanted applications, but takes no action. You can review information about the applications Defender would have taken action against by searching for events that are created by Defender in the Event Viewer.
934934

935935
- **Turn on cloud-delivered protection**
936936
CSP: [AllowCloudProtection](/windows/client-management/mdm/policy-csp-defender#defender-allowcloudprotection)
937937

938-
By default, Defender for Cloud on Windows 10/11 desktop devices sends information to Microsoft about any problems it finds. Microsoft analyzes that information to learn more about problems affecting you and other customers, to offer improved solutions.
938+
By default, Defender on Windows 10/11 desktop devices sends information to Microsoft about any problems it finds. Microsoft analyzes that information to learn more about problems affecting you and other customers, to offer improved solutions.
939939

940940
- **Yes** (*default*) - Cloud-delivered protection is turned on. Device users can't change this setting.
941941
- **Not configured** - The setting is restored to the system default.
@@ -992,10 +992,10 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
992992

993993
Configure the number of days items should be kept in the quarantine folder before being removed. The default is zero (**0**), which results in quarantined files never being removed.
994994

995-
- **Defender for Cloud system scan schedule**
995+
- **Defender system scan schedule**
996996
CSP: [Defender/ScheduleScanDay](/windows/client-management/mdm/policy-csp-defender#defender-schedulescanday)
997997

998-
Schedule on which day Defender for Cloud scans devices. By default the scan is **User defined** but can be set to *Everyday*, any day of the week, or to have *No scheduled scan*.
998+
Schedule on which day Defender scans devices. By default the scan is **User defined** but can be set to *Everyday*, any day of the week, or to have *No scheduled scan*.
999999

10001000
- **Additional amount of time (0-50 seconds) to extend cloud protection timeout**
10011001
CSP: [Defender/CloudExtendedTimeout](/windows/client-management/mdm/policy-csp-defender#defender-cloudextendedtimeout)
@@ -1044,13 +1044,13 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
10441044
- **Scan browser scripts**
10451045
CSP: [Defender/AllowScriptScanning](/windows/client-management/mdm/policy-csp-defender)
10461046

1047-
- **Yes** (*default*) - The Microsoft Defender for Cloud Script Scanning functionality is enforced and the user can't turn them off.
1047+
- **Yes** (*default*) - The Microsoft Defender Script Scanning functionality is enforced and the user can't turn them off.
10481048
- **Not configured** - The setting is returned to client default, which is to enable script scanning, however the user can turn it off.
10491049

10501050
- **Block user access to Microsoft Defender app**
10511051
CSP: [Defender/AllowUserUIAccess](/windows/client-management/mdm/policy-csp-defender#defender-allowuseruiaccess)
10521052

1053-
- **Yes** (*default*) - The Microsoft Defender for Cloud User Interface (UI) is inaccessible and notifications are surprised
1053+
- **Yes** (*default*) - The Microsoft Defender User Interface (UI) is inaccessible and notifications are surprised
10541054
- **Not configured**
10551055
When set to Yes, the Windows Defender User Interface (UI) will be inaccessible and notifications will be surprised. When set to Not configured, the setting will return to client default in which UI and notifications will be allowed
10561056

@@ -1074,10 +1074,10 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
10741074

10751075
If no value is defined, devices use the client default of **8** hours.
10761076

1077-
- **Defender for Cloud sample submission consent**
1077+
- **Defender sample submission consent**
10781078
CSP: [Defender/SubmitSamplesConsent](/windows/client-management/mdm/policy-csp-defender#defender-submitsamplesconsent)
10791079

1080-
Checks for the user consent level in Microsoft Defender for Cloud to send data. If the required consent has already been granted, Microsoft Defender for Cloud submits them. If not (and if the user has specified never to ask), the UI launches to ask for user consent (when *Cloud-delivered protection* is set to *Yes*) before sending data.
1080+
Checks for the user consent level in Microsoft Defender to send data. If the required consent has already been granted, Microsoft Defender submits them. If not (and if the user has specified never to ask), the UI launches to ask for user consent (when *Cloud-delivered protection* is set to *Yes*) before sending data.
10811081

10821082
- **Send safe samples automatically** (*default*)
10831083
- **Always prompt**
@@ -1088,7 +1088,7 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
10881088
CSP: [CloudBlockLevel](/windows/client-management/mdm/policy-csp-defender#defender-cloudblocklevel)
10891089

10901090
Configure how aggressive Defender Antivirus is in blocking and scanning suspicious files.
1091-
- **Not configured** (*default*) - Default Defender for Cloud blocking level.
1091+
- **Not configured** (*default*) - Default Defender blocking level.
10921092
- **High** - Aggressively block unknowns while optimizing client performance, which includes a greater chance of false positives.
10931093
- **High plus** - Aggressively block unknowns and apply additional protection measures that might impact client performance.
10941094
- **Zero tolerance** - Block all unknown executable files.
@@ -1114,21 +1114,21 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
11141114
- **Scan network files**
11151115
CSP: [Defender/AllowScanningNetworkFiles](/windows/client-management/mdm/policy-csp-defender#defender-allowscanningnetworkfiles)
11161116

1117-
- **Yes** (*default*) - Microsoft Defender for Cloud scans network files.
1117+
- **Yes** (*default*) - Microsoft Defender scans network files.
11181118
- **Not configured** - The client returns to its default, which disables scanning of network files.
11191119

1120-
- **Defender for Cloud potentially unwanted app action**
1120+
- **Defender potentially unwanted app action**
11211121
CSP: [Defender/PUAProtection](/windows/client-management/mdm/policy-csp-defender#defender-puaprotection)
11221122

1123-
Specify the level of detection for potentially unwanted applications (PUAs). Security alerts users when potentially unwanted software is being downloaded or attempts to install on a device.
1123+
Specify the level of detection for potentially unwanted applications (PUAs). Defender alerts users when potentially unwanted software is being downloaded or attempts to install on a device.
11241124
- **Device default**
11251125
- **Block** (*default*) - Detected items are blocked, and show in history along with other threats.
1126-
- **Audit** - Defender for Cloud detects potentially unwanted applications, but takes no action. You can review information about the applications Defender for Cloud would have taken action against by searching for events that are created by Defender for Cloud in the Event Viewer.
1126+
- **Audit** - Defender detects potentially unwanted applications, but takes no action. You can review information about the applications Defender would have taken action against by searching for events that are created by Defender in the Event Viewer.
11271127

11281128
- **Turn on cloud-delivered protection**
11291129
CSP: [AllowCloudProtection](/windows/client-management/mdm/policy-csp-defender#defender-allowcloudprotection)
11301130

1131-
By default, Defender for Cloud on Windows 10/11 desktop devices sends information to Microsoft about any problems it finds. Microsoft analyzes that information to learn more about problems affecting you and other customers, to offer improved solutions.
1131+
By default, Defender on Windows 10/11 desktop devices sends information to Microsoft about any problems it finds. Microsoft analyzes that information to learn more about problems affecting you and other customers, to offer improved solutions.
11321132

11331133
- **Yes** (*default*) - Cloud-delivered protection is turned on. Device users can't change this setting.
11341134
- **Not configured** - The setting is restored to the system default.
@@ -1154,7 +1154,7 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
11541154

11551155
This ASR rule is controlled via the following GUID: D3E037E1-3EB8-44C8-A917-57927947596D
11561156
- **Not configured** - The setting returns to the Windows default, which is off.
1157-
- **Block** (*default*) - Defender for Cloud blocks JavaScript or VBScript files that have been downloaded from the Internet from being executed.
1157+
- **Block** (*default*) - Defender blocks JavaScript or VBScript files that have been downloaded from the Internet from being executed.
11581158
- **Audit mode** - Windows events are raised instead of blocking.
11591159

11601160
- **Enable network protection**
@@ -1202,7 +1202,7 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
12021202

12031203
This ASR rule is controlled via the following GUID: 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC
12041204
- **Not configured** - The setting returns to the Windows default, which is off.
1205-
- **Block** (*default*) - Defender for Cloud will block execution of obfuscated scripts.
1205+
- **Block** (*default*) - Defender will block execution of obfuscated scripts.
12061206
- **Audit mode** - Windows events are raised instead of blocking.
12071207

12081208
- **Block Win32 API calls from Office macro**

memdocs/intune/protect/security-baseline-settings-mdm-all.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1531,7 +1531,7 @@ For more information, see [Policy CSP - LocalPoliciesSecurityOptions](/windows/c
15311531
- **Require admin approval mode for administrators**:
15321532
This policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer. The options are:
15331533

1534-
- *Not configured* - Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Defender for Cloud notifies you that the overall security of the operating system has been reduced.
1534+
- *Not configured* - Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.
15351535

15361536
- *Yes* - Admin Approval Mode is enabled. This policy must be enabled and the related UAC policy settings must be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.
15371537

@@ -1601,7 +1601,7 @@ For more information, see [Policy CSP - LocalPoliciesSecurityOptions](/windows/c
16011601

16021602
**Default**: Yes
16031603

1604-
## Microsoft Defender for Cloud
1604+
## Microsoft Defender
16051605

16061606
For more information, see [Policy CSP - Defender](/windows/client-management/mdm/policy-csp-defender) in the Windows documentation.
16071607

@@ -1630,16 +1630,16 @@ This rule prevents attacks by blocking Adobe Reader from creating additional pro
16301630

16311631
**Default** Quick scan
16321632

1633-
- **Defender for Cloud schedule scan day**:
1634-
Defender for Cloud schedule scan day.
1633+
- **Defender schedule scan day**:
1634+
Defender schedule scan day.
16351635

16361636
**Default**: Everyday
16371637

16381638
::: zone-end
16391639
::: zone pivot="mdm-december-2020,november-2021"
16401640

1641-
- **Defender for Cloud scan start time**:
1642-
Defender for Cloud schedule scan time.
1641+
- **Defender scan start time**:
1642+
Defender schedule scan time.
16431643

16441644
**Default**: Not configured
16451645

@@ -1724,7 +1724,7 @@ This rule prevents attacks by blocking Adobe Reader from creating additional pro
17241724
- **Block execution of potentially obfuscated scripts (js/vbs/ps)**:
17251725
[Protect devices from exploits](/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction)
17261726

1727-
When set to yes, Defender for Cloud will block execution of obfuscated scripts. When set to Audit only, Windows events will be raised instead of blocking. Setting to Not Configured will return the setting to Windows default, which is off. This ASR rule is controlled via the following GUID: 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC
1727+
When set to yes, Defender will block execution of obfuscated scripts. When set to Audit only, Windows events will be raised instead of blocking. Setting to Not Configured will return the setting to Windows default, which is off. This ASR rule is controlled via the following GUID: 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC
17281728

17291729
**Default**: Block
17301730

@@ -1742,7 +1742,7 @@ This rule prevents attacks by blocking Adobe Reader from creating additional pro
17421742

17431743
**Default**: Enable
17441744

1745-
- **Defender for Cloud potentially unwanted app action**:
1745+
- **Defender potentially unwanted app action**:
17461746
CSP: [Defender/PUAProtection](/windows/client-management/mdm/policy-csp-defender#defender-puaprotection)+
17471747

17481748
The potentially unwanted application (PUA) protection feature in Microsoft Defender Antivirus can identify and block PUAs from downloading and installing on endpoints in your network. These applications aren't considered viruses, malware, or other types of threats, but might do actions on endpoints that adversely affect their performance or use. PUA can also refer to applications that are considered to have a poor reputation. Typical PUA behavior includes: Various types of software bundling Ad injection into web browsers Driver and registry optimizers that detect issues, request payment to fix the errors, but remain on the endpoint and make no changes or optimizations (also known as "rogue antivirus" programs). These applications can increase the risk of your network being infected with malware, cause malware infections to be harder to identify, and can waste IT resources in cleaning up the applications.
@@ -1763,10 +1763,10 @@ This rule prevents attacks by blocking Adobe Reader from creating additional pro
17631763

17641764
**Default**: Enable
17651765

1766-
- **Defender for Cloud sample submission consent type**:
1766+
- **Defender sample submission consent type**:
17671767
[Defender/SubmitSamplesConsent](/windows/client-management/mdm/policy-csp-defender#defender-submitsamplesconsent)
17681768

1769-
Checks for the user consent level in Microsoft Defender for Cloud to send data. If the required consent has already been granted, Microsoft Defender for Cloud submits them. If not, (and if the user has specified never to ask), the UI is launched to ask for user consent (when Defender/AllowCloudProtection is allowed) before sending data.
1769+
Checks for the user consent level in Microsoft Defender to send data. If the required consent has already been granted, Microsoft Defender submits them. If not, (and if the user has specified never to ask), the UI is launched to ask for user consent (when Defender/AllowCloudProtection is allowed) before sending data.
17701770

17711771
**Default**: Send safe samples automatically
17721772

memdocs/intune/user-help/you-need-to-resolve-a-threat-found-by-checkpoint-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ ms.collection:
3131

3232
# Resolve a threat found by SandBlast Mobile Protect on iOS
3333

34-
SandBlast Mobile Protect is a Mobile Threat Defender for Cloud service that identifies and assesses potential threats on your iOS devices. It then reports the threats so that you can view them from the Company Portal app. Threats appear to you in the app as unresolved, noncompliant issues. As long as these threats are present, you may be unable to:
34+
SandBlast Mobile Protect is a Mobile Threat Defender service that identifies and assesses potential threats on your iOS devices. It then reports the threats so that you can view them from the Company Portal app. Threats appear to you in the app as unresolved, noncompliant issues. As long as these threats are present, you may be unable to:
3535

3636
* Connect to corporate e-mail
3737
* Connect to corporate Wi-Fi

0 commit comments

Comments
 (0)