Skip to content

Commit 18b243c

Browse files
committed
Update evaluate-mda-using-mde-security-settings-management.md
1 parent 06fe361 commit 18b243c

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-endpoint/evaluate-mda-using-mde-security-settings-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ To enable Attack Surface Reduction (ASR) rules using the endpoint security polic
164164
|Block Office applications from injecting code into other processes|Block|
165165
|Block persistence through WMI event subscription|Block|
166166
|Use advanced protection against ransomware|Block|
167-
|Block process creations originating from PSExec and WMI commands|Block <br/> **NOTE**: If you have Configuration Manager (formerly SCCM), or other management tools that use WMI you might need to set this to **Audit** instead of **Block**.|
167+
|Block process creations originating from PSExec and WMI commands|Block <br/> Please note thatIf you have Configuration Manager (formerly SCCM), or other management tools that use WMI you might need to set this to **Audit** instead of **Block**.|
168168
|[PREVIEW] Block rebooting machine in Safe Mode|Block|
169169
|Enable Controlled Folder Access|Enabled|
170170

@@ -200,7 +200,7 @@ It's important to check that the Cloud Protection network connectivity is workin
200200
CMD (Run as admin)
201201

202202

203-
```
203+
```powershell
204204
cd "C:\Program Files\Windows Defender"
205205
MpCmdRun.exe -ValidateMapsConnection
206206
```

0 commit comments

Comments
 (0)