Skip to content

Commit 6328dd4

Browse files
committed
Update enable-exploit-protection.md
1 parent f98c382 commit 6328dd4

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

defender-endpoint/enable-exploit-protection.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Safe deployment practices (SDP): Safe deployment processes and procedures define
5656

5757
Start out with a small set (for example, 10 to 50) of Windows devices and use that as your test environment to see which of the 21 mitigations, are incompatible with exploit protection. Remove the mitigations that aren't compatible with the application. Reiterate with the applications that you're targeting. Once you feel that the policy is ready for production.
5858

59-
Start out by pushing first to User Acceptance Testing (UAT) usually comprised of the IT administrators, Security administrators and help desk personnel. Then to 1%, 5%, 10%, 25%, 50%, 75%, and finally to 100% of your environment.
59+
Start out by pushing first to User Acceptance Testing (UAT) comprised of the IT administrators, Security administrators and help desk personnel. Then to 1%, 5%, 10%, 25%, 50%, 75%, and finally to 100% of your environment.
6060

6161
## Enabling exploit protection mitigations
6262

@@ -86,7 +86,7 @@ You can also set mitigations to [audit mode](evaluate-exploit-protection.md). Au
8686
- Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with its extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
8787
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
8888

89-
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** will apply the mitigation in audit mode only. You're notified if you need to restart the process or app, or if you need to restart Windows.
89+
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** applies the mitigation in audit mode only. You're notified if you need to restart the process or app, or if you need to restart Windows.
9090

9191
5. Repeat steps 3-4 for all the apps and mitigations you want to configure.
9292

@@ -98,7 +98,7 @@ You can also set mitigations to [audit mode](evaluate-exploit-protection.md). Au
9898

9999
7. Repeat step 6 for all the system-level mitigations you want to configure. Select **Apply** when you're done setting up your configuration.
100100

101-
If you add an app to the **Program settings** section and configure individual mitigation settings there, they'll be honored above the configuration for the same mitigations specified in the **System settings** section. The following matrix and examples help to illustrate how defaults work:
101+
If you add an app to the **Program settings** section and configure individual mitigation settings there, they are honored above the configuration for the same mitigations specified in the **System settings** section. The following matrix and examples help to illustrate how defaults work:
102102

103103
|Enabled in **Program settings**|Enabled in **System settings**|Behavior|
104104
|:---|:---|:---|
@@ -132,7 +132,7 @@ The result is that DEP is enabled for *test.exe*. DEP won't be enabled for any o
132132
- Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
133133
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
134134

135-
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** applies the mitigation in audit mode only. You are notified if you need to restart the process or app, or if you need to restart Windows.
135+
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** applies the mitigation in audit mode only. You're notified if you need to restart the process or app, or if you need to restart Windows.
136136

137137
5. Repeat steps 3-4 for all the apps and mitigations you want to configure. Select **Apply** when you're done setting up your configuration.
138138

@@ -294,7 +294,7 @@ For information about customizing the notification when a rule is triggered and
294294

295295
## Removing the exploit protection mitigations
296296

297-
To reset (undo or remove) the exploit protection mitigations, please review the [Exploit protection reference](/defender-endpoint/exploit-protection-reference).
297+
To reset (undo or remove) the exploit protection mitigations, see the [Exploit protection reference](/defender-endpoint/exploit-protection-reference).
298298

299299
## See also
300300

0 commit comments

Comments
 (0)