Skip to content

Commit 0c85646

Browse files
authored
Merge pull request #1244 from MicrosoftDocs/main
Publish main to live, Wednesday 3:30PM PDT, 08/28
2 parents 2ce3dff + 0878f64 commit 0c85646

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

defender-endpoint/device-control-overview.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Get an overview of device control, including removable storage acce
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
7-
ms.date: 08/27/2024
7+
ms.date: 08/28/2024
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -57,7 +57,6 @@ Device control capabilities from Microsoft can be organized into three main cate
5757

5858
- **Device control in Defender for Endpoint**. Device control in Defender for Endpoint provides more advanced capabilities and is cross platform.
5959
- Granular access control - create policies to control access by device, device type, operation (read, write, execute), user group, network location, or file type.
60-
- File evidence - store the file information and contents to audit files copied or accessed on devices.
6160
- Reporting and advanced hunting - complete visibility into add device related activities.
6261
- Device control in Microsoft Defender can be managed using Intune or [Group Policy](device-control-deploy-manage-gpo.md).
6362
- **Device control in Microsoft Defender and Intune**. Intune provides a rich experience for managing complex device control policies for organizations. You can configure and deploy device restriction settings in Defender for Endpoint, for example. See [Deploy and manage device control with Microsoft Intune](device-control-deploy-manage-intune.md).

defender-endpoint/linux-preferences.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: dansimp
77
author: dansimp
88
ms.localizationpriority: medium
9-
ms.date: 07/31/2024
9+
ms.date: 08/28/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -63,12 +63,13 @@ Specifies the enforcement preference of antivirus engine. There are three values
6363
- Real-time (`real_time`): Real-time protection (scan files as they're modified) is enabled.
6464
- On-demand (`on_demand`): Files are scanned only on demand. In this:
6565
- Real-time protection is turned off.
66-
- Passive (`passive`): Runs the antivirus engine in passive mode. In this:
66+
- Passive (`passive`): Runs the antivirus engine in passive mode. In this case, all of the following apply:
6767
- Real-time protection is turned off: Threats are not remediated by Microsoft Defender Antivirus.
6868
- On-demand scanning is turned on: Still use the scan capabilities on the endpoint.
69-
- Automatic threat remediation is turned off: No files will be moved and security admin is expected to take required action.
70-
- Security intelligence updates are turned on: Alerts will be available on security admins tenant.
71-
69+
- Automatic threat remediation is turned off: No files are moved and your security administrator is expected to take required action.
70+
- Security intelligence updates are turned on: Alerts are available in the security administrator's tenant.
71+
- Definition updates occur only when a scan starts, even if `automaticDefinitionUpdateEnabled` is set to `true` in passive mode.
72+
7273
|Description|JSON Value|Defender Portal Value|
7374
|---|---|---|
7475
|**Key**|enforcementLevel|Enforcement Level|

0 commit comments

Comments
 (0)