Skip to content

Commit cfe89c5

Browse files
authored
Merge pull request #1782 from Leicham/patch-6
Update device-restrictions-windows-10.md
2 parents e4015e8 + 33aaae5 commit cfe89c5

1 file changed

Lines changed: 6 additions & 4 deletions

File tree

memdocs/intune/configuration/device-restrictions-windows-10.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 06/04/2021
10+
ms.date: 07/19/2021
1111
ms.topic: reference
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -1120,11 +1120,13 @@ These settings use the [defender policy CSP](/windows/client-management/mdm/poli
11201120
- **Detect potentially unwanted applications**: This feature identifies and blocks potentially unwanted applications (PUA) from downloading and installing in your network. These applications aren't considered viruses, malware, or other types of threats. But, they can run actions on endpoints that might affect their performance or use. Choose the level of protection when Windows detects PUAs. Your options:
11211121

11221122
- **Not configured** (default): Intune doesn't change or update this setting. By default, Microsoft Defender might disable this feature.
1123-
- **Off**: PUA Protection off.
1123+
- **Off** or **Disabled**: PUA Protection off.
11241124
- **Enable**: Microsoft Defender detects PUAs, and detected items are blocked. These items show in history along with other threats.
11251125
- **Audit**: Microsoft Defender detects PUAs, but takes no action. You can review information about the applications Microsoft Defender would take action against. For example, search for events created by Microsoft Defender in the Event Viewer.
11261126

1127-
For more information about potentially unwanted apps, see [Detect and block potentially unwanted applications](/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus).
1127+
In **Endpoint Security** > **Antivirus** > **Microsoft Defender Antivirus** > **Remediation**, this setting is called **Action to take on potentially unwanted applications**.
1128+
1129+
For more information about potentially unwanted apps, see [Detect and block potentially unwanted applications](/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus).
11281130

11291131
[Defender/PUAProtection CSP](/windows/client-management/mdm/policy-csp-defender#defender-puaprotection)
11301132

@@ -1264,4 +1266,4 @@ These settings use the [power policy CSP](/windows/client-management/mdm/policy-
12641266

12651267
For additional technical details on each setting and what editions of Windows are supported, see [Windows 10 Policy CSP Reference](/windows/client-management/mdm/policy-configuration-service-provider)
12661268

1267-
[Assign the profile](device-profile-assign.md), and [monitor its status](device-profile-monitor.md).
1269+
[Assign the profile](device-profile-assign.md), and [monitor its status](device-profile-monitor.md).

0 commit comments

Comments
 (0)