You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/mde-security-settings-management.md
+9-21Lines changed: 9 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -197,19 +197,15 @@ For more information, see:
197
197
|---|---|
198
198
| Engine Updates Channel |Not configured|
199
199
200
-
For more information, see:
201
-
202
-
[Manage the gradual rollout process for Microsoft Defender updates](/defender-endpoint/manage-gradual-rollout)
200
+
For more information, see [Manage the gradual rollout process for Microsoft Defender updates](/defender-endpoint/manage-gradual-rollout).
203
201
204
202
**Platform updates**:
205
203
206
204
|Description|Setting|
207
205
|---|---|
208
206
| Platform Updates Channel |Not configured|
209
207
210
-
For more information, see:
211
-
212
-
[Manage the gradual rollout process for Microsoft Defender updates](/defender-endpoint/manage-gradual-rollout)
208
+
For more information, see [Manage the gradual rollout process for Microsoft Defender updates](/defender-endpoint/manage-gradual-rollout).
213
209
214
210
**Scheduled scan and On-Demand scan**:
215
211
@@ -233,7 +229,7 @@ For more information, see:
233
229
| Schedule Quick Scan Time | 720 |
234
230
235
231
> [!NOTE]
236
-
> In this example, a quick scan runs daily on the Windows clients at 12:00 p.m. (720).
232
+
> In this example, a quick scan runs daily on the Windows clients at 12:00 PM. (720).
237
233
> In this example, we use lunch time, since many devices nowadays are turned off after-hours (e.g laptops).
238
234
239
235
***Weekly Quick Scan or Full Scan***
@@ -246,8 +242,8 @@ For more information, see:
246
242
247
243
248
244
> [!NOTE]
249
-
> In this example, a quick scan runs for Windows clients on Wednesday's at 5:00 p.m. (1020).
250
-
> And for Windows Servers, on Saturday's at 1:00 a.m. (60)
245
+
> In this example, a quick scan runs for Windows clients on Wednesday's at 5:00 PM. (1020).
246
+
> And for Windows Servers, on Saturday's at 1:00 AM. (60)
251
247
252
248
For more information, see:
253
249
@@ -269,9 +265,7 @@ For more information, see:
269
265
|Days To Retain Cleaned Malware|Configured, 60|
270
266
|Allow User UI Access|Allowed. Let users access UI.|
271
267
272
-
For more information, see:
273
-
274
-
[Configure remediation for Microsoft Defender Antivirus detections](/defender-endpoint/configure-remediation-microsoft-defender-antivirus)
268
+
For more information, see [Configure remediation for Microsoft Defender Antivirus detections](/defender-endpoint/configure-remediation-microsoft-defender-antivirus).
275
269
276
270
**Antivirus exclusions:**
277
271
@@ -302,9 +296,7 @@ For more information, see:
302
296
| Disable Core Service ECS Integration | The Defender core service uses the Experimentation and Configuration Service (ECS) to rapidly deliver critical, org-specific fixes. |
303
297
| Disable Core Service Telemetry | The Defender core service uses the OneDsCollector framework to rapidly collect telemetry.|
304
298
305
-
For more information, see:
306
-
307
-
[Microsoft Defender Core service overview](/defender-endpoint/microsoft-defender-core-service-overview)
299
+
For more information, see [Microsoft Defender Core service overview](/defender-endpoint/microsoft-defender-core-service-overview).
308
300
309
301
**Network Protection**:
310
302
@@ -319,9 +311,7 @@ For more information, see:
319
311
|Disable TLS parsing|TLS parsing is enabled.|
320
312
|Enable DNS Sinkhole|DNS Sinkhole is enabled.|
321
313
322
-
For more information, see:
323
-
324
-
[Use network protection to help prevent connections to malicious or suspicious sites](/defender-endpoint/network-protection)
314
+
For more information, see [Use network protection to help prevent connections to malicious or suspicious sites](/defender-endpoint/network-protection).
325
315
326
316
1. When you're done configuring settings, select **Next**.
327
317
2. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
@@ -367,9 +357,7 @@ To enable Attack Surface Reduction (ASR) rules using the endpoint security polic
367
357
> [!TIP]
368
358
> Any of the rules might block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named "Attack Surface Reduction Only Exclusions." Additionally, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
0 commit comments