Skip to content

Commit d8bd863

Browse files
authored
Merge pull request #7433 from Brenduns/kpi-april-14216992
Acrolinx pass
2 parents 3a3e764 + 44d1d8e commit d8bd863

1 file changed

Lines changed: 31 additions & 31 deletions

File tree

memdocs/intune/protect/endpoint-protection-windows-10.md

Lines changed: 31 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,7 @@ ms.collection:
2929
> [!NOTE]
3030
> [!INCLUDE [not-all-settings-are-documented](../includes/not-all-settings-are-documented.md)]
3131
32-
Microsoft Intune includes many settings to help protect your devices. This article describes the settings in the device configuration *Endpoint protection* template. In addition to this profile and use of the settings catalog, you can use [endpoint security policies](../protect/endpoint-security-policy.md) to focus more directly on specific areas of device security.
33-
32+
Microsoft Intune includes many settings to help protect your devices. This article describes the settings in the device configuration *Endpoint protection* template. To manage device security, you can also use [endpoint security policies](../protect/endpoint-security-policy.md), which focus directly on subsets of device security.
3433
To configure Microsoft Defender Antivirus, see [Windows device restrictions](../configuration/device-restrictions-windows-10.md#microsoft-defender-antivirus) or use [endpoint security Antivirus policy](endpoint-security-antivirus-policy.md).
3534

3635
## Before you begin
@@ -41,7 +40,7 @@ For more information about configuration service providers (CSPs), see [Configur
4140

4241
## Microsoft Defender Application Guard
4342

44-
While using Microsoft Edge, Microsoft Defender Application Guard protects your environment from sites that aren't trusted by your organization. When users visit sites that aren't listed in your isolated network boundary, the sites open in a Hyper-V virtual browsing session. Trusted sites are defined by a network boundary, which are configured in Device Configuration. For more information, see [Create a network boundary on Windows devices](../configuration/network-boundary-windows.md).
43+
For Microsoft Edge, Microsoft Defender Application Guard protects your environment from sites that aren't trusted by your organization. With Application Guard, sites that aren't in your isolated network boundary open in a Hyper-V virtual browsing session. Trusted sites are defined by a network boundary, which are configured in Device Configuration. For more information, see [Create a network boundary on Windows devices](../configuration/network-boundary-windows.md).
4544

4645
Application Guard is only available for 64-bit Windows devices. Using this profile installs a Win32 component to activate Application Guard.
4746

@@ -219,7 +218,7 @@ The following settings are each listed in this article a single time, but all ap
219218
This option is ignored if *Stealth mode* is set to *Block*.
220219

221220
- **Not configured**
222-
- **Block** - IPSec secured packets do not receive exemptions.
221+
- **Block** - IPSec secured packets don't receive exemptions.
223222
- **Allow** - Enable exemptions. The firewall's stealth mode MUST NOT prevent the host computer from responding to unsolicited network traffic that is secured by IPsec.
224223

225224
- **Shielded**
@@ -341,7 +340,8 @@ Custom Firewall rules support the following options:
341340
- **Application(s)**
342341
**Default**: All
343342

344-
Control connections for an app or program. Select one of the following options, and then complete the additional configuration:
343+
Control connections for an app or program. Apps and programs can be specified either by *file path*, *package family name*, or *service name*:
344+
345345
- **Package family name** – Specify a package family name. To find the package family name, use the PowerShell command **Get-AppxPackage**.
346346
Firewall CSP: [FirewallRules/*FirewallRuleName*/App/PackageFamilyName](/windows/client-management/mdm/firewall-csp#packagefamilyname)
347347

@@ -351,7 +351,7 @@ Custom Firewall rules support the following options:
351351
- **Windows service** – Specify the Windows service short name if it's a service and not an application that sends or receives traffic. To find the service short name, use the PowerShell command **Get-Service**.
352352
Firewall CSP: [FirewallRules/*FirewallRuleName*/App/ServiceName](/windows/client-management/mdm/firewall-csp#servicename)
353353

354-
- **All***No additional configuration is available*.
354+
- **All***No configurations is required*
355355

356356
#### IP address settings
357357

@@ -364,8 +364,8 @@ Specify the local and remote addresses to which this rule applies.
364364
Select **Any address** or **Specified address**.
365365

366366
When you use *Specified address*, you add one or more addresses as a comma-separated list of local addresses that are covered by the rule. Valid tokens include:
367-
- Use an asterisk "*" for *any* local address. If you use an asterisk, it must be the only token you use.
368-
- To specify a subnet use either the subnet mask or network prefix notation. If neither a subnet mask nor a network prefix is specified, the subnet mask defaults to 255.255.255.255.
367+
- Use an asterisk `*` for *any* local address. If you use an asterisk, it must be the only token you use.
368+
- Specify a subnet by either the subnet mask or network prefix notation. If a subnet mask or a network prefix isn't specified, the subnet mask defaults to 255.255.255.255.
369369
- A valid IPv6 address.
370370
- An IPv4 address range in the format of "start address - end address" with no spaces included.
371371
- An IPv6 address range in the format of "start address - end address" with no spaces included.
@@ -378,16 +378,16 @@ Specify the local and remote addresses to which this rule applies.
378378

379379
When you use *Specified address*, you add one or more addresses as a comma-separated list of remote addresses that are covered by the rule. Tokens aren't case-sensitive. Valid tokens include:
380380
- Use an asterisk "*" for *any* remote address. If you use an asterisk, it must be the only token you use.
381-
- "Defaultgateway"
382-
- "DHCP"
383-
- "DNS"
384-
- "WINS"
385-
- "Intranet" (supported on Windows versions 1809 and later)
386-
- "RmtIntranet" (supported on Windows versions 1809 and later)
387-
- "Internet" (supported on Windows versions 1809 and later)
388-
- "Ply2Renders" (supported on Windows versions 1809 and later)
389-
- "LocalSubnet" indicates any local address on the local subnet.
390-
- To specify a subnet use either the subnet mask or network prefix notation. If neither a subnet mask nor a network prefix is specified, the subnet mask defaults to 255.255.255.255.
381+
- `Defaultgateway`
382+
- `DHCP`
383+
- `DNS`
384+
- `WINS`
385+
- `Intranet` (supported on Windows versions 1809 and later)
386+
- `RmtIntranet` (supported on Windows versions 1809 and later)
387+
- `Internet` (supported on Windows versions 1809 and later)
388+
- `Ply2Renders` (supported on Windows versions 1809 and later)
389+
- `LocalSubnet` indicates any local address on the local subnet.
390+
- Specify a subnet by either the subnet mask or network prefix notation. If a subnet mask or a network prefix isn't specified, the subnet mask defaults to 255.255.255.255.
391391
- A valid IPv6 address.
392392
- An IPv4 address range in the format of "start address - end address" with no spaces included.
393393
- An IPv6 address range in the format of "start address - end address" with no spaces included.
@@ -399,7 +399,7 @@ Specify the local and remote ports to which this rule applies.
399399
**Default**: Any
400400
Firewall CSP: [FirewallRules/*FirewallRuleName*/Protocol](/windows/client-management/mdm/firewall-csp#protocol)
401401
Select from the following, and complete any required configurations:
402-
- **All** – No additional configuration is available.
402+
- **All** – No configuration is available.
403403
- **TCP** – Configure local and remote ports. Both options support All ports or Specified ports. Enter Specified ports by using a comma-separated list.
404404
- **Local ports** - Firewall CSP: [FirewallRules/*FirewallRuleName*/LocalPortRanges](/windows/client-management/mdm/firewall-csp#localportranges)
405405
- **Remote ports** - Firewall CSP: [FirewallRules/*FirewallRuleName*/RemotePortRanges](/windows/client-management/mdm/firewall-csp#remoteportranges)
@@ -604,7 +604,7 @@ These settings apply specifically to operating system data drives.
604604
BitLocker CSP: [SystemDrivesRecoveryOptions](/windows/client-management/mdm/bitlocker-csp#systemdrivesrecoveryoptions)
605605

606606
- **Enable** - Control how BitLocker-protected operating system drives recover when the required start-up information isn't available.
607-
- **Not configured** - Default recovery options are supported for BitLocker recovery. By default, a DRA is allowed, the recovery options are chosen by the user, including the recovery password and recovery key, and recovery information isn't backed up to AD DS.
607+
- **Not configured** - Default recovery options are supported including DRA. The end user can specify recovery options. Recovery information isn't backed up to AD DS.
608608

609609
When set to *Enable*, you can configure the following settings:
610610

@@ -787,16 +787,16 @@ To learn more, see [Attack surface reduction rules](/windows/security/threat-pro
787787

788788
**Merge behavior for Attack surface reduction rules in Intune**:
789789

790-
Attack surface reduction rules support a merger of settings from different policies, to create a superset of policy for each device. Only the settings that are not in conflict are merged, while those that are in conflict are not added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile would be deployed.
790+
Attack surface reduction rules support a merger of settings from different policies, to create a superset of policy for each device. Only the settings that aren't in conflict are merged, while settings that are in conflict aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile would be deployed.
791791

792792
Attack surface reduction rule merge behavior is as follows:
793793

794794
- Attack surface reduction rules from the following profiles are evaluated for each device the rules apply to:
795795
- Devices > Configuration policy > Endpoint protection profile > Microsoft Defender Exploit Guard > **Attack Surface Reduction**
796796
- Endpoint security > Attack surface reduction policy > **Attack surface reduction rules**
797797
- Endpoint security > Security baselines > Microsoft Defender for Endpoint Baseline > **Attack Surface Reduction Rules**.
798-
- Settings that do not have conflicts are added to a superset of policy for the device.
799-
- When two or more policies have conflicting settings, the conflicting settings are not added to the combined policy, while settings that don’t conflict are added to the superset policy that applies to a device.
798+
- Settings that don't have conflicts are added to a superset of policy for the device.
799+
- When two or more policies have conflicting settings, the conflicting settings aren't added to the combined policy. Settings that don’t conflict are added to the superset policy that applies to a device.
800800
- Only the configurations for conflicting settings are held back.
801801

802802
**Settings in this profile**:
@@ -997,11 +997,11 @@ Block outbound connections from any app to IP addresses or domains with low repu
997997
- **Upload XML**
998998
**Default**: *Not configured*
999999

1000-
To use exploit protection to [protect devices from exploits](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection), create an XML file that includes the system and application mitigation settings you want. There are two methods to create the XML file:
1000+
To use *Exploit protection* to [protect devices from exploits](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection), create an XML file that includes the system and application mitigation settings you want. There are two methods to create the XML file:
10011001

10021002
- *PowerShell* - Use one or more of the *Get-ProcessMitigation*, *Set-ProcessMitigation*, and *ConvertTo-ProcessMitigationPolicy* PowerShell cmdlets. The cmdlets configure mitigation settings, and export an XML representation of them.
10031003

1004-
- *Microsoft Defender Security Center UI* - In the Microsoft Defender Security Center, click on App & browser control and then scroll to the bottom of the resulting screen to find Exploit Protection. First, use the System settings and Program settings tabs to configure mitigation settings. Then, find the Export settings link at the bottom of the screen to export an XML representation of them.
1004+
- *Microsoft Defender Security Center UI* - In the Microsoft Defender Security Center, select *App & browser control* and then scroll to the bottom of the resulting screen to find Exploit Protection. First, use the System settings and Program settings tabs to configure mitigation settings. Then, find the Export settings link at the bottom of the screen to export an XML representation of them.
10051005

10061006
- **User editing of the exploit protection interface**
10071007
**Default**: Not configured
@@ -1012,7 +1012,7 @@ Block outbound connections from any app to IP addresses or domains with low repu
10121012

10131013
## Microsoft Defender Application Control
10141014

1015-
Choose additional apps that either need to be audited by, or can be trusted to run by Microsoft Defender Application Control. Windows components and all apps from Windows store are automatically trusted to run.
1015+
Choose apps to be audited by or that are trusted to be run by Microsoft Defender Application Control. Windows components and all apps from Windows store are automatically trusted to run.
10161016

10171017
- **Application control code integrity policies**
10181018
**Default**: Not configured
@@ -1022,7 +1022,7 @@ Choose additional apps that either need to be audited by, or can be trusted to r
10221022

10231023
After being enabled on a device, Application Control can only be disabled by changing the mode from *Enforce* to *Audit only*. Changing the mode from *Enforce* to *Not Configured* results in Application Control continuing to be enforced on assigned devices.
10241024

1025-
- **Not Configured** - Application Control is not added to devices. However, settings that were previously added continue to be enforced on assigned devices.
1025+
- **Not Configured** - Application Control isn't added to devices. However, settings that were previously added continue to be enforced on assigned devices.
10261026

10271027
- **Audit only** - Applications aren't blocked. All events are logged in the local client's logs.
10281028

@@ -1173,7 +1173,7 @@ Block end-user access to the various areas of the Microsoft Defender Security Ce
11731173
Turn Tamper Protection on or off on devices. To use Tamper Protection, you must [integrate Microsoft Defender for Endpoint with Intune](advanced-threat-protection.md), and have [Enterprise Mobility + Security E5 Licenses](../fundamentals/licenses.md).
11741174
- **Not configured** - No change is made to device settings.
11751175
- **Enabled** - Tamper Protection is turned on and restrictions are enforced on devices.
1176-
- **Disabled** - Tamper Protection is turned off and restrictions are not enforced.
1176+
- **Disabled** - Tamper Protection is turned off and restrictions aren't enforced.
11771177

11781178
### IT contact Information
11791179

@@ -1280,7 +1280,7 @@ Use these options to configure the local security settings on Windows 10/11 devi
12801280
**Default**: Not configured
12811281
CSP: [Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly](/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions)
12821282

1283-
- **Enabled** - Only the interactively logged-on user can use the CD-ROM media. If this policy is enabled, and no one is logged on interactively, then the CD-ROM is accessed over the network.
1283+
- **Enabled** - Only the interactively logged-on user can use the CD-ROM media. If this policy is enabled and no one is logged on interactively, then the CD-ROM is accessed over the network.
12841284
- **Not configured** - Anyone has access to the CD-ROM.
12851285

12861286
- **Format and eject removable media**
@@ -1465,8 +1465,8 @@ Use these options to configure the local security settings on Windows 10/11 devi
14651465
LocalPoliciesSecurityOptions CSP: [Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn](/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions)
14661466

14671467

1468-
- **Block** - Hide the shutdown option on the Windows sign in screen. Users must sign in to the device, and then shut down.
1469-
- **Not configured** - Allow users to shut down the device from the Windows sign in screen.
1468+
- **Block** - Hide the shutdown option on the Windows sign-in screen. Users must sign in to the device, and then shut down.
1469+
- **Not configured** - Allow users to shut down the device from the Windows sign-in screen.
14701470

14711471
### User account control
14721472

0 commit comments

Comments
 (0)