Skip to content

Commit 2a2cc45

Browse files
committed
Update mde-p1-setup-configuration.md
1 parent aad7b0a commit 2a2cc45

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

defender-endpoint/mde-p1-setup-configuration.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -235,7 +235,7 @@ We recommend using Intune to configure controlled folder access.
235235

236236
8. On the **Assignments** tab, select **Add all users** and **+ Add all devices**, and then choose **Next**. (You can alternately specify specific groups of users or devices.)
237237

238-
9. On the **Review + create** tab, review the settings for your policy, and then choose **Create**. The policy will be applied to any endpoints that were onboarded to Defender for Endpoint shortly.
238+
9. On the **Review + create** tab, review the settings for your policy, and then choose **Create**. The policy is applied to any endpoints that were onboarded to Defender for Endpoint shortly.
239239

240240
### Device control
241241

@@ -255,7 +255,7 @@ You can configure Defender for Endpoint to block or allow removable devices and
255255

256256
5. On the **Configuration settings** tab, select **All Settings**. Then in the search box, type `Removable` to see all the settings that pertain to removable devices.
257257

258-
6. Select an item in the list, such as **All Removable Storage classes: Deny all access**, to open its flyout pane. The flyout for each setting explains what happens when it is enabled, disabled, or not configured. Select a setting, and then choose **OK**.
258+
6. Select an item in the list, such as **All Removable Storage classes: Deny all access**, to open its flyout pane. The flyout for each setting explains what happens when it's enabled, disabled, or not configured. Select a setting, and then choose **OK**.
259259

260260
7. Repeat step 6 for each setting that you want to configure. Then choose **Next**.
261261

@@ -265,7 +265,7 @@ You can configure Defender for Endpoint to block or allow removable devices and
265265

266266
9. On the **Assignments** tab, select **Add all users** and **+ Add all devices**, and then choose **Next**. (You can alternately specify specific groups of users or devices.)
267267

268-
10. On the **Review + create** tab, review the settings for your policy, and then choose **Create**. The policy will be applied to any endpoints that were onboarded to Defender for Endpoint shortly.
268+
10. On the **Review + create** tab, review the settings for your policy, and then choose **Create**. The policy is applied to any endpoints that were onboarded to Defender for Endpoint shortly.
269269

270270
> [!TIP]
271271
> For more information, see [How to control USB devices and other removable media using Microsoft Defender for Endpoint](device-control-overview.md).
@@ -288,19 +288,19 @@ With network protection, you can help protect your organization against dangerou
288288

289289
5. On the **Configuration settings** tab, expand **Microsoft Defender Exploit Guard**, and then expand **Network filtering**.
290290

291-
Set **Network protection** to **Enable**. (You can alternately choose **Audit** to see how network protection will work in your environment at first.)
291+
Set **Network protection** to **Enable**. (You can alternately choose **Audit** to see how network protection works in your environment at first.)
292292

293293
Then choose **Next**.
294294

295295
6. On the **Assignments** tab, select **Add all users** and **+ Add all devices**, and then choose **Next**. (You can alternately specify specific groups of users or devices.)
296296

297-
7. On the **Applicability Rules** tab, set up a rule. The profile you are configuring will be applied only to devices that meet the combined criteria you specify.
297+
7. On the **Applicability Rules** tab, set up a rule. The profile you're configuring is applied only to devices that meet the combined criteria you specify.
298298

299299
For example, you might choose to assign the policy to endpoints that are running a certain OS edition only.
300300

301301
Then choose **Next**.
302302

303-
8. On the **Review + create** tab, review the settings for your policy, and then choose **Create**. The policy will be applied to any endpoints that were onboarded to Defender for Endpoint shortly.
303+
8. On the **Review + create** tab, review the settings for your policy, and then choose **Create**. The policy is applied to any endpoints that were onboarded to Defender for Endpoint shortly.
304304

305305
> [!TIP]
306306
> You can use other methods, such as Windows PowerShell or Group Policy, to enable network protection. To learn more, see [Turn on network protection](enable-network-protection.md).
@@ -323,7 +323,7 @@ With web protection, you can protect your organization's devices from web threat
323323

324324
| Setting | Recommendation |
325325
|:---|:---|
326-
| **Enable network protection** | Set to **Enabled**. Prevents users from visiting malicious sites or domains. <br/><br/>Alternately, you can set network protection to **Audit mode** to see how it will work in your environment. In audit mode, network protection does not prevent users from visiting sites or domains, but it does track detections as events. |
326+
| **Enable network protection** | Set to **Enabled**. Prevents users from visiting malicious sites or domains. <br/><br/>Alternately, you can set network protection to **Audit mode** to see how it works in your environment. In audit mode, network protection doesn't prevent users from visiting sites or domains, but it does track detections as events. |
327327
| **Require SmartScreen for Microsoft Edge Legacy** | Set to **Yes**. Helps protect users from potential phishing scams and malicious software. |
328328
| **Block malicious site access** | Set to **Yes**. Prevents users from bypassing warnings about potentially malicious sites. |
329329
| **Block unverified file download** | Set to **Yes**. Prevents users from bypassing the warnings and downloading unverified files. |
@@ -411,7 +411,7 @@ To help with planning your WDAC deployment, see the following resources:
411411

412412
## Next steps
413413

414-
Now that you have gone through the setup and configuration process, your next step is to get started using Defender for Endpoint.
414+
Now that you've finished the setup and configuration process, your next step is to get started using Defender for Endpoint.
415415

416416
- [Get started with Defender for Endpoint Plan 1](mde-plan1-getting-started.md)
417417

0 commit comments

Comments
 (0)