You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Checks for the user consent level in Microsoft Defender for Cloud to send data. If the required consent has already been granted, Microsoft Defender for Cloud submits them. If not (and if the user has specified never to ask), the UI launches to ask for user consent (when *Cloud-delivered protection* is set to *Yes*) before sending data.
905
+
Checks for the user consent level in Microsoft Defender to send data. If the required consent has already been granted, Microsoft Defender submits them. If not (and if the user has specified never to ask), the UI launches to ask for user consent (when *Cloud-delivered protection* is set to *Yes*) before sending data.
906
906
907
907
-**Send safe samples automatically** (*default*)
908
908
-**Always prompt**
@@ -913,7 +913,7 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
Specify the level of detection for potentially unwanted applications (PUAs). Security alerts users when potentially unwanted software is being downloaded or attempts to install on a device.
930
+
Specify the level of detection for potentially unwanted applications (PUAs). Defender alerts users when potentially unwanted software is being downloaded or attempts to install on a device.
931
931
-**Device default**
932
932
-**Block** (*default*) - Detected items are blocked, and show in history along with other threats.
933
-
-**Audit** - Defender for Cloud detects potentially unwanted applications, but takes no action. You can review information about the applications Defender for Cloud would have taken action against by searching for events that are created by Defender for Cloud in the Event Viewer.
933
+
-**Audit** - Defender detects potentially unwanted applications, but takes no action. You can review information about the applications Defender would have taken action against by searching for events that are created by Defender in the Event Viewer.
By default, Defender for Cloud on Windows 10/11 desktop devices sends information to Microsoft about any problems it finds. Microsoft analyzes that information to learn more about problems affecting you and other customers, to offer improved solutions.
938
+
By default, Defender on Windows 10/11 desktop devices sends information to Microsoft about any problems it finds. Microsoft analyzes that information to learn more about problems affecting you and other customers, to offer improved solutions.
939
939
940
940
-**Yes** (*default*) - Cloud-delivered protection is turned on. Device users can't change this setting.
941
941
-**Not configured** - The setting is restored to the system default.
@@ -992,10 +992,10 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
992
992
993
993
Configure the number of days items should be kept in the quarantine folder before being removed. The default is zero (**0**), which results in quarantined files never being removed.
Schedule on which day Defender for Cloud scans devices. By default the scan is **User defined** but can be set to *Everyday*, any day of the week, or to have *No scheduled scan*.
998
+
Schedule on which day Defender scans devices. By default the scan is **User defined** but can be set to *Everyday*, any day of the week, or to have *No scheduled scan*.
999
999
1000
1000
-**Additional amount of time (0-50 seconds) to extend cloud protection timeout**
-**Yes** (*default*) - The Microsoft Defender for Cloud User Interface (UI) is inaccessible and notifications are surprised
1053
+
-**Yes** (*default*) - The Microsoft Defender User Interface (UI) is inaccessible and notifications are surprised
1054
1054
-**Not configured**
1055
1055
When set to Yes, the Windows Defender User Interface (UI) will be inaccessible and notifications will be surprised. When set to Not configured, the setting will return to client default in which UI and notifications will be allowed
1056
1056
@@ -1074,10 +1074,10 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
1074
1074
1075
1075
If no value is defined, devices use the client default of **8** hours.
Checks for the user consent level in Microsoft Defender for Cloud to send data. If the required consent has already been granted, Microsoft Defender for Cloud submits them. If not (and if the user has specified never to ask), the UI launches to ask for user consent (when *Cloud-delivered protection* is set to *Yes*) before sending data.
1080
+
Checks for the user consent level in Microsoft Defender to send data. If the required consent has already been granted, Microsoft Defender submits them. If not (and if the user has specified never to ask), the UI launches to ask for user consent (when *Cloud-delivered protection* is set to *Yes*) before sending data.
1081
1081
1082
1082
-**Send safe samples automatically** (*default*)
1083
1083
-**Always prompt**
@@ -1088,7 +1088,7 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
Specify the level of detection for potentially unwanted applications (PUAs). Security alerts users when potentially unwanted software is being downloaded or attempts to install on a device.
1123
+
Specify the level of detection for potentially unwanted applications (PUAs). Defender alerts users when potentially unwanted software is being downloaded or attempts to install on a device.
1124
1124
-**Device default**
1125
1125
-**Block** (*default*) - Detected items are blocked, and show in history along with other threats.
1126
-
-**Audit** - Defender for Cloud detects potentially unwanted applications, but takes no action. You can review information about the applications Defender for Cloud would have taken action against by searching for events that are created by Defender for Cloud in the Event Viewer.
1126
+
-**Audit** - Defender detects potentially unwanted applications, but takes no action. You can review information about the applications Defender would have taken action against by searching for events that are created by Defender in the Event Viewer.
By default, Defender for Cloud on Windows 10/11 desktop devices sends information to Microsoft about any problems it finds. Microsoft analyzes that information to learn more about problems affecting you and other customers, to offer improved solutions.
1131
+
By default, Defender on Windows 10/11 desktop devices sends information to Microsoft about any problems it finds. Microsoft analyzes that information to learn more about problems affecting you and other customers, to offer improved solutions.
1132
1132
1133
1133
-**Yes** (*default*) - Cloud-delivered protection is turned on. Device users can't change this setting.
1134
1134
-**Not configured** - The setting is restored to the system default.
@@ -1154,7 +1154,7 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
1154
1154
1155
1155
This ASR rule is controlled via the following GUID: D3E037E1-3EB8-44C8-A917-57927947596D
1156
1156
-**Not configured** - The setting returns to the Windows default, which is off.
1157
-
-**Block** (*default*) - Defender for Cloud blocks JavaScript or VBScript files that have been downloaded from the Internet from being executed.
1157
+
-**Block** (*default*) - Defender blocks JavaScript or VBScript files that have been downloaded from the Internet from being executed.
1158
1158
-**Audit mode** - Windows events are raised instead of blocking.
1159
1159
1160
1160
-**Enable network protection**
@@ -1202,7 +1202,7 @@ For more information, see [Firewall CSP](/windows/client-management/mdm/firewall
1202
1202
1203
1203
This ASR rule is controlled via the following GUID: 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC
1204
1204
-**Not configured** - The setting returns to the Windows default, which is off.
1205
-
-**Block** (*default*) - Defender for Cloud will block execution of obfuscated scripts.
1205
+
-**Block** (*default*) - Defender will block execution of obfuscated scripts.
1206
1206
-**Audit mode** - Windows events are raised instead of blocking.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/security-baseline-settings-mdm-all.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1531,7 +1531,7 @@ For more information, see [Policy CSP - LocalPoliciesSecurityOptions](/windows/c
1531
1531
-**Require admin approval mode for administrators**:
1532
1532
This policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer. The options are:
1533
1533
1534
-
-*Not configured* - Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Defender for Cloud notifies you that the overall security of the operating system has been reduced.
1534
+
-*Not configured* - Admin Approval Mode and all related UAC policy settings are disabled. Note: If this policy setting is disabled, the Security Center notifies you that the overall security of the operating system has been reduced.
1535
1535
1536
1536
-*Yes* - Admin Approval Mode is enabled. This policy must be enabled and the related UAC policy settings must be set appropriately to allow the built-in Administrator account and all other users who are members of the Administrators group to run in Admin Approval Mode.
1537
1537
@@ -1601,7 +1601,7 @@ For more information, see [Policy CSP - LocalPoliciesSecurityOptions](/windows/c
1601
1601
1602
1602
**Default**: Yes
1603
1603
1604
-
## Microsoft Defender for Cloud
1604
+
## Microsoft Defender
1605
1605
1606
1606
For more information, see [Policy CSP - Defender](/windows/client-management/mdm/policy-csp-defender) in the Windows documentation.
1607
1607
@@ -1630,16 +1630,16 @@ This rule prevents attacks by blocking Adobe Reader from creating additional pro
1630
1630
1631
1631
**Default** Quick scan
1632
1632
1633
-
-**Defender for Cloud schedule scan day**:
1634
-
Defender for Cloud schedule scan day.
1633
+
-**Defender schedule scan day**:
1634
+
Defender schedule scan day.
1635
1635
1636
1636
**Default**: Everyday
1637
1637
1638
1638
::: zone-end
1639
1639
::: zone pivot="mdm-december-2020,november-2021"
1640
1640
1641
-
-**Defender for Cloud scan start time**:
1642
-
Defender for Cloud schedule scan time.
1641
+
-**Defender scan start time**:
1642
+
Defender schedule scan time.
1643
1643
1644
1644
**Default**: Not configured
1645
1645
@@ -1724,7 +1724,7 @@ This rule prevents attacks by blocking Adobe Reader from creating additional pro
1724
1724
-**Block execution of potentially obfuscated scripts (js/vbs/ps)**:
1725
1725
[Protect devices from exploits](/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction)
1726
1726
1727
-
When set to yes, Defender for Cloud will block execution of obfuscated scripts. When set to Audit only, Windows events will be raised instead of blocking. Setting to Not Configured will return the setting to Windows default, which is off. This ASR rule is controlled via the following GUID: 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC
1727
+
When set to yes, Defender will block execution of obfuscated scripts. When set to Audit only, Windows events will be raised instead of blocking. Setting to Not Configured will return the setting to Windows default, which is off. This ASR rule is controlled via the following GUID: 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC
1728
1728
1729
1729
**Default**: Block
1730
1730
@@ -1742,7 +1742,7 @@ This rule prevents attacks by blocking Adobe Reader from creating additional pro
1742
1742
1743
1743
**Default**: Enable
1744
1744
1745
-
-**Defender for Cloud potentially unwanted app action**:
The potentially unwanted application (PUA) protection feature in Microsoft Defender Antivirus can identify and block PUAs from downloading and installing on endpoints in your network. These applications aren't considered viruses, malware, or other types of threats, but might do actions on endpoints that adversely affect their performance or use. PUA can also refer to applications that are considered to have a poor reputation. Typical PUA behavior includes: Various types of software bundling Ad injection into web browsers Driver and registry optimizers that detect issues, request payment to fix the errors, but remain on the endpoint and make no changes or optimizations (also known as "rogue antivirus" programs). These applications can increase the risk of your network being infected with malware, cause malware infections to be harder to identify, and can waste IT resources in cleaning up the applications.
@@ -1763,10 +1763,10 @@ This rule prevents attacks by blocking Adobe Reader from creating additional pro
1763
1763
1764
1764
**Default**: Enable
1765
1765
1766
-
-**Defender for Cloud sample submission consent type**:
Checks for the user consent level in Microsoft Defender for Cloud to send data. If the required consent has already been granted, Microsoft Defender for Cloud submits them. If not, (and if the user has specified never to ask), the UI is launched to ask for user consent (when Defender/AllowCloudProtection is allowed) before sending data.
1769
+
Checks for the user consent level in Microsoft Defender to send data. If the required consent has already been granted, Microsoft Defender submits them. If not, (and if the user has specified never to ask), the UI is launched to ask for user consent (when Defender/AllowCloudProtection is allowed) before sending data.
Copy file name to clipboardExpand all lines: memdocs/intune/user-help/you-need-to-resolve-a-threat-found-by-checkpoint-ios.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ ms.collection:
31
31
32
32
# Resolve a threat found by SandBlast Mobile Protect on iOS
33
33
34
-
SandBlast Mobile Protect is a Mobile Threat Defender for Cloud service that identifies and assesses potential threats on your iOS devices. It then reports the threats so that you can view them from the Company Portal app. Threats appear to you in the app as unresolved, noncompliant issues. As long as these threats are present, you may be unable to:
34
+
SandBlast Mobile Protect is a Mobile Threat Defender service that identifies and assesses potential threats on your iOS devices. It then reports the threats so that you can view them from the Company Portal app. Threats appear to you in the app as unresolved, noncompliant issues. As long as these threats are present, you may be unable to:
0 commit comments