Skip to content

Commit 4d0b313

Browse files
committed
Learn Editor: Update use-group-policy-microsoft-defender-antivirus.md
1 parent f46c455 commit 4d0b313

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

defender-endpoint/use-group-policy-microsoft-defender-antivirus.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ The following table lists commonly used Group Policy settings that are available
8484
| MAPS | Configure local setting override for reporting to Microsoft MAPS| [Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md) |
8585
| MpEngine | Configure extended cloud check| [Configure the cloud block time-out period](configure-cloud-block-timeout-period-microsoft-defender-antivirus.md) |
8686
| MpEngine | Disable gradual rollout of Microsoft Defender updates | [Configure updates: Group Policy](configure-updates.md#group-policy) |
87-
| MpEngine | Enable file hash computation feature | [Create indicators for files](/defender-endpoint/indicator-file#windows-prerequisites)<br>This drives the ability to enforce Indicators of Compromise (IoC) via Indicators - File hash - allow/block which is available with Microsoft Defender for Endpoint Plan 1 or Microsoft Defender for Endpoint Plan 2 or Microsoft Defender for Business. Defender Antivirus automatically does hash-based computation for the antimalware engine, thus customers don't have to do anything extra unless it is a VDI non-persistent image as documented [here](/defender-endpoint/deployment-vdi-microsoft-defender-antivirus) |
87+
| MpEngine | Enable file hash computation feature |[Create indicators for files](/defender-endpoint/indicator-file#windows-prerequisites)<br>This drives the ability to enforce Indicators of Compromise (IoC) via Indicators - File hash - allow/block which is available with Microsoft Defender for Endpoint Plan 1 or Microsoft Defender for Endpoint Plan 2 or Microsoft Defender for Business. Note: Defender Antivirus automatically does hash-based computation for the antimalware engine, thus you do not have to do anything extra unless it is a VDI non-persistent image as documented [here](/defender-endpoint/deployment-vdi-microsoft-defender-antivirus). |
8888
| MpEngine | Select cloud protection level | [Specify the cloud-delivered protection level](specify-cloud-protection-level-microsoft-defender-antivirus.md) |
8989
| Network inspection system | Convert warn verdict to block | [Network protection: Warn experience](network-protection.md#warn-experience) |
9090
| Network inspection system | Specify more definition sets for network traffic inspection | Not used (deprecated) |

0 commit comments

Comments
 (0)