You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/mde-p1-setup-configuration.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -235,7 +235,7 @@ We recommend using Intune to configure controlled folder access.
235
235
236
236
8. On the **Assignments** tab, select **Add all users** and **+ Add all devices**, and then choose **Next**. (You can alternately specify specific groups of users or devices.)
237
237
238
-
9. On the **Review + create** tab, review the settings for your policy, and then choose **Create**. The policy will be applied to any endpoints that were onboarded to Defender for Endpoint shortly.
238
+
9. On the **Review + create** tab, review the settings for your policy, and then choose **Create**. The policy is applied to any endpoints that were onboarded to Defender for Endpoint shortly.
239
239
240
240
### Device control
241
241
@@ -255,7 +255,7 @@ You can configure Defender for Endpoint to block or allow removable devices and
255
255
256
256
5. On the **Configuration settings** tab, select **All Settings**. Then in the search box, type `Removable` to see all the settings that pertain to removable devices.
257
257
258
-
6. Select an item in the list, such as **All Removable Storage classes: Deny all access**, to open its flyout pane. The flyout for each setting explains what happens when it is enabled, disabled, or not configured. Select a setting, and then choose **OK**.
258
+
6. Select an item in the list, such as **All Removable Storage classes: Deny all access**, to open its flyout pane. The flyout for each setting explains what happens when it's enabled, disabled, or not configured. Select a setting, and then choose **OK**.
259
259
260
260
7. Repeat step 6 for each setting that you want to configure. Then choose **Next**.
261
261
@@ -265,7 +265,7 @@ You can configure Defender for Endpoint to block or allow removable devices and
265
265
266
266
9. On the **Assignments** tab, select **Add all users** and **+ Add all devices**, and then choose **Next**. (You can alternately specify specific groups of users or devices.)
267
267
268
-
10. On the **Review + create** tab, review the settings for your policy, and then choose **Create**. The policy will be applied to any endpoints that were onboarded to Defender for Endpoint shortly.
268
+
10. On the **Review + create** tab, review the settings for your policy, and then choose **Create**. The policy is applied to any endpoints that were onboarded to Defender for Endpoint shortly.
269
269
270
270
> [!TIP]
271
271
> For more information, see [How to control USB devices and other removable media using Microsoft Defender for Endpoint](device-control-overview.md).
@@ -288,19 +288,19 @@ With network protection, you can help protect your organization against dangerou
288
288
289
289
5. On the **Configuration settings** tab, expand **Microsoft Defender Exploit Guard**, and then expand **Network filtering**.
290
290
291
-
Set **Network protection** to **Enable**. (You can alternately choose **Audit** to see how network protection will work in your environment at first.)
291
+
Set **Network protection** to **Enable**. (You can alternately choose **Audit** to see how network protection works in your environment at first.)
292
292
293
293
Then choose **Next**.
294
294
295
295
6. On the **Assignments** tab, select **Add all users** and **+ Add all devices**, and then choose **Next**. (You can alternately specify specific groups of users or devices.)
296
296
297
-
7. On the **Applicability Rules** tab, set up a rule. The profile you are configuring will be applied only to devices that meet the combined criteria you specify.
297
+
7. On the **Applicability Rules** tab, set up a rule. The profile you're configuring is applied only to devices that meet the combined criteria you specify.
298
298
299
299
For example, you might choose to assign the policy to endpoints that are running a certain OS edition only.
300
300
301
301
Then choose **Next**.
302
302
303
-
8. On the **Review + create** tab, review the settings for your policy, and then choose **Create**. The policy will be applied to any endpoints that were onboarded to Defender for Endpoint shortly.
303
+
8. On the **Review + create** tab, review the settings for your policy, and then choose **Create**. The policy is applied to any endpoints that were onboarded to Defender for Endpoint shortly.
304
304
305
305
> [!TIP]
306
306
> You can use other methods, such as Windows PowerShell or Group Policy, to enable network protection. To learn more, see [Turn on network protection](enable-network-protection.md).
@@ -323,7 +323,7 @@ With web protection, you can protect your organization's devices from web threat
323
323
324
324
| Setting | Recommendation |
325
325
|:---|:---|
326
-
|**Enable network protection**| Set to **Enabled**. Prevents users from visiting malicious sites or domains. <br/><br/>Alternately, you can set network protection to **Audit mode** to see how it will work in your environment. In audit mode, network protection does not prevent users from visiting sites or domains, but it does track detections as events. |
326
+
|**Enable network protection**| Set to **Enabled**. Prevents users from visiting malicious sites or domains. <br/><br/>Alternately, you can set network protection to **Audit mode** to see how it works in your environment. In audit mode, network protection doesn't prevent users from visiting sites or domains, but it does track detections as events. |
327
327
|**Require SmartScreen for Microsoft Edge Legacy**| Set to **Yes**. Helps protect users from potential phishing scams and malicious software. |
328
328
|**Block malicious site access**| Set to **Yes**. Prevents users from bypassing warnings about potentially malicious sites. |
329
329
|**Block unverified file download**| Set to **Yes**. Prevents users from bypassing the warnings and downloading unverified files. |
@@ -411,7 +411,7 @@ To help with planning your WDAC deployment, see the following resources:
411
411
412
412
## Next steps
413
413
414
-
Now that you have gone through the setup and configuration process, your next step is to get started using Defender for Endpoint.
414
+
Now that you've finished the setup and configuration process, your next step is to get started using Defender for Endpoint.
415
415
416
416
-[Get started with Defender for Endpoint Plan 1](mde-plan1-getting-started.md)
0 commit comments