Skip to content

Commit be59893

Browse files
committed
Baseline Settings doc update
1 parent 35cd74f commit be59893

1 file changed

Lines changed: 40 additions & 2 deletions

File tree

memdocs/intune/protect/security-baseline-settings-mdm-all.md

Lines changed: 40 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ description: Review the defaults and available settings for the different versio
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 11/19/2021
10+
ms.date: 04/06/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -67,6 +67,16 @@ To update a security baseline profile to the latest version of that baseline, se
6767
::: zone-end
6868
::: zone pivot="mdm-sept-2020,mdm-december-2020,november-2021"
6969

70+
## Above Lock
71+
72+
- **Voice activate apps from locked screen**
73+
Specifies whether or not the user can interact with a voice assistant using speech while the system is locked. If you enable or don’t configure this setting, the user can interact with voice assistant using speech while the system is locked. If you disable this setting, the system will need to be unlocked for the user to interact using speech.
74+
[Learn More](/windows/client-management/mdm/policy-csp-privacy)
75+
76+
- **Block display of toast notifications**
77+
Block toast notifications above the device lock screen.
78+
[Learn More](/windows/client-management/mdm/policy-csp-abovelock#abovelock-allowtoasts)
79+
7080
## App Runtime
7181

7282
For more information, see [Policy CSP - AppRuntime](/windows/client-management/mdm/policy-csp-appruntime) in the Windows documentation.
@@ -1628,7 +1638,7 @@ This rule prevents attacks by blocking Adobe Reader from creating additional pro
16281638

16291639
Specify the scan type to use for a schedule scan
16301640

1631-
**Default** Quick scan
1641+
**Default**: Quick scan
16321642

16331643
- **Defender schedule scan day**:
16341644
Defender schedule scan day.
@@ -1646,6 +1656,20 @@ This rule prevents attacks by blocking Adobe Reader from creating additional pro
16461656
::: zone-end
16471657
::: zone pivot="mdm-sept-2020,mdm-december-2020,november-2021"
16481658

1659+
- **Cloud-delivered protection level**
1660+
CSP: [Defender/CloudBlockLevel](/windows/client-management/mdm/policy-csp-defender#defender-cloudblocklevel)
1661+
1662+
Specify the level of cloud-delivered protection. Not Configured uses the default Microsoft Defender Antivirus blocking level and provides strong detection without increasing the risk of detecting legitimate files. High applies a strong level of detection. High + uses the High level and applies addition protection measures (may impact client performance). Zero tolerance blocks all unknown executables While unlikely, setting to High may cause some legitimate files to be detected.
1663+
1664+
**Default**: Not Configured
1665+
1666+
- **Scan network files**
1667+
CSP: [Defender/AllowScanningNetworkFiles](/windows/client-management/mdm/policy-csp-defender#defender-allowscanningnetworkfiles)
1668+
1669+
When set to Yes, Microsoft Defender will scan network files. When set to Not configured, the client will return to default with is disabling scanning of network files.
1670+
1671+
**Default**: Yes
1672+
16491673
- **Turn on real-time protection**
16501674
CSP: [Defender/AllowRealtimeMonitoring](/windows/client-management/mdm/policy-csp-defender#defender-allowrealtimemonitoring)
16511675

@@ -1680,6 +1704,13 @@ This rule prevents attacks by blocking Adobe Reader from creating additional pro
16801704

16811705
**Default**: Yes
16821706

1707+
- **Turn on cloud-delivered protection**
1708+
CSP: [Defender/AllowCloudProtection](/windows/client-management/mdm/policy-csp-defender#defender-allowcloudprotection)
1709+
1710+
When set to Yes, Defender will send information to Microsoft about any problems it finds. If set to Not configured, the client will return to default which enables the feature but allows the user to disable it.
1711+
1712+
**Default**: Yes
1713+
16831714
- **Scan incoming mail messages**:
16841715
CSP: [Defender/AllowEmailScanning](/windows/client-management/mdm/policy-csp-defender#defender-allowemailscanning)
16851716

@@ -1728,6 +1759,13 @@ This rule prevents attacks by blocking Adobe Reader from creating additional pro
17281759

17291760
**Default**: Block
17301761

1762+
- **Block JavaScript or VBScript from launching downloaded executable content**:
1763+
[Protect devices from exploits](/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction)
1764+
1765+
When set to Yes, Defender will block Javascript or VBScript files that have been downloaded from the Internet from being executed. When set to Audit only, Windows events will be raised instead of blocking. Setting to Not Configured will return the setting to Windows default, which is off. This attack surface reduction (ASR) rule is controlled via the following GUID: D3E037E1-3EB8-44C8-A917-57927947596D
1766+
1767+
**Default**: Block
1768+
17311769
- **Block executable content download from email and webmail clients**:
17321770
[Block executable content download from email and webmail clients](/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction)
17331771

0 commit comments

Comments
 (0)