Skip to content

Commit 57937fd

Browse files
authored
Fix broken links and update time format
1 parent dd6fc60 commit 57937fd

File tree

1 file changed

+9
-21
lines changed

1 file changed

+9
-21
lines changed

defender-endpoint/mde-security-settings-management.md

Lines changed: 9 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -197,19 +197,15 @@ For more information, see:
197197
|---|---|
198198
| Engine Updates Channel |Not configured|
199199

200-
For more information, see:
201-
202-
[Manage the gradual rollout process for Microsoft Defender updates](/defender-endpoint/manage-gradual-rollout)
200+
For more information, see [Manage the gradual rollout process for Microsoft Defender updates](/defender-endpoint/manage-gradual-rollout).
203201

204202
**Platform updates**:
205203

206204
|Description|Setting|
207205
|---|---|
208206
| Platform Updates Channel |Not configured|
209207

210-
For more information, see:
211-
212-
[Manage the gradual rollout process for Microsoft Defender updates](/defender-endpoint/manage-gradual-rollout)
208+
For more information, see [Manage the gradual rollout process for Microsoft Defender updates](/defender-endpoint/manage-gradual-rollout).
213209

214210
**Scheduled scan and On-Demand scan**:
215211

@@ -233,7 +229,7 @@ For more information, see:
233229
| Schedule Quick Scan Time | 720 |
234230

235231
> [!NOTE]
236-
> In this example, a quick scan runs daily on the Windows clients at 12:00 p.m. (720).
232+
> In this example, a quick scan runs daily on the Windows clients at 12:00 PM. (720).
237233
> In this example, we use lunch time, since many devices nowadays are turned off after-hours (e.g laptops).
238234
239235
***Weekly Quick Scan or Full Scan***
@@ -246,8 +242,8 @@ For more information, see:
246242

247243

248244
> [!NOTE]
249-
> In this example, a quick scan runs for Windows clients on Wednesday's at 5:00 p.m. (1020).
250-
> And for Windows Servers, on Saturday's at 1:00 a.m. (60)
245+
> In this example, a quick scan runs for Windows clients on Wednesday's at 5:00 PM. (1020).
246+
> And for Windows Servers, on Saturday's at 1:00 AM. (60)
251247
252248
For more information, see:
253249

@@ -269,9 +265,7 @@ For more information, see:
269265
|Days To Retain Cleaned Malware|Configured, 60|
270266
|Allow User UI Access|Allowed. Let users access UI.|
271267

272-
For more information, see:
273-
274-
[Configure remediation for Microsoft Defender Antivirus detections](/defender-endpoint/configure-remediation-microsoft-defender-antivirus)
268+
For more information, see [Configure remediation for Microsoft Defender Antivirus detections](/defender-endpoint/configure-remediation-microsoft-defender-antivirus).
275269

276270
**Antivirus exclusions:**
277271

@@ -302,9 +296,7 @@ For more information, see:
302296
| Disable Core Service ECS Integration | The Defender core service uses the Experimentation and Configuration Service (ECS) to rapidly deliver critical, org-specific fixes. |
303297
| Disable Core Service Telemetry | The Defender core service uses the OneDsCollector framework to rapidly collect telemetry.|
304298

305-
For more information, see:
306-
307-
[Microsoft Defender Core service overview](/defender-endpoint/microsoft-defender-core-service-overview)
299+
For more information, see [Microsoft Defender Core service overview](/defender-endpoint/microsoft-defender-core-service-overview).
308300

309301
**Network Protection**:
310302

@@ -319,9 +311,7 @@ For more information, see:
319311
|Disable TLS parsing|TLS parsing is enabled.|
320312
|Enable DNS Sinkhole|DNS Sinkhole is enabled.|
321313

322-
For more information, see:
323-
324-
[Use network protection to help prevent connections to malicious or suspicious sites](/defender-endpoint/network-protection)
314+
For more information, see [Use network protection to help prevent connections to malicious or suspicious sites](/defender-endpoint/network-protection).
325315

326316
1. When you're done configuring settings, select **Next**.
327317
2. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
@@ -367,9 +357,7 @@ To enable Attack Surface Reduction (ASR) rules using the endpoint security polic
367357
> [!TIP]
368358
> Any of the rules might block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named "Attack Surface Reduction Only Exclusions." Additionally, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
369359
370-
For more information, see:
371-
372-
[Attack surface reduction rules deployment overview](/defender-endpoint/attack-surface-reduction-rules-deployment)
360+
For more information, see [Attack surface reduction rules deployment overview](/defender-endpoint/attack-surface-reduction-rules-deployment).
373361

374362
1. Select **Next**.
375363
1. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.

0 commit comments

Comments
 (0)