Skip to content

Commit 6e11a0e

Browse files
Merge pull request #4523 from MicrosoftDocs/repo-health-check-july
Repo health check
2 parents 2ce5468 + 9c0a841 commit 6e11a0e

File tree

6 files changed

+5
-21
lines changed

6 files changed

+5
-21
lines changed

defender-endpoint/gov.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -160,6 +160,7 @@ These are the known gaps:
160160
|Microsoft Defender for Endpoint Security Configuration Management|:::image type="icon" source="media/svg/check-yes.svg" border="false":::|:::image type="icon" source="media/svg/check-yes.svg" border="false":::|:::image type="icon" source="media/svg/check-yes.svg" border="false":::|
161161
|Microsoft Defender for IoT enterprise IoT security|:::image type="icon" source="media/svg/check-no.svg" border="false":::|:::image type="icon" source="media/svg/check-no.svg" border="false":::|:::image type="icon" source="media/svg/check-no.svg" border="false":::|
162162

163+
163164
> [!NOTE]
164165
> While Microsoft Secure Score is available for GCC, GCC High and DoD customers, there are some security recommendations that aren't available.
165166

defender-endpoint/mac-install-with-intune.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -488,6 +488,7 @@ To download the onboarding package from the Microsoft Defender portal:
488488

489489
1. Select **Download onboarding package**. Save it as _GatewayWindowsDefenderATPOnboardingPackage.zip_ to the same directory.
490490

491+
491492
1. Extract the contents of the .zip file:
492493

493494
```bash

defender-for-cloud/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +0,0 @@
1-
- name: Index
2-
href: index.md

defender-for-cloud/index.md

Lines changed: 0 additions & 16 deletions
This file was deleted.

defender-office-365/anti-malware-protection-for-spo-odfb-teams-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ By default, users can download infected files from SharePoint or OneDrive. Here'
5353
1. In a web browser, a user tries to download a file from SharePoint or OneDrive that happens to be infected.
5454
2. The user is shown a warning that a virus was detected in the file. The user is given the option to proceed with the download and attempt to clean it using anti-virus software on their device.
5555

56-
To change this behavior so users can't download infected files from SharePoint or OneDrive, even from the anti-virus warning window, admins can use the *DisallowInfectedFileDownload* parameter on the **[Set-SPOTenant](/powershell/module/sharepoint-online/Set-SPOTenant)** cmdlet in SharePoint Online PowerShell. The value $true for the *DisallowInfectedFileDownload* parameter completely blocks access to detected/blocked files for users.
56+
To change this behavior so users can't download infected files from SharePoint or OneDrive, even from the anti-virus warning window, admins can use the *DisallowInfectedFileDownload* parameter on the **[Set-SPOTenant](/powershell/module/microsoft.online.sharepoint.powershell/set-spotenant)** cmdlet in SharePoint Online PowerShell. The value $true for the *DisallowInfectedFileDownload* parameter completely blocks access to detected/blocked files for users.
5757

5858
For instructions, see [Use SharePoint Online PowerShell to prevent users from downloading malicious files](safe-attachments-for-spo-odfb-teams-configure.md#step-2-recommended-use-sharepoint-online-powershell-to-prevent-users-from-downloading-malicious-files).
5959

defender-office-365/safe-attachments-for-spo-odfb-teams-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ Set-SPOTenant -DisallowInfectedFileDownload $true
9595
- This setting affects both users and admins.
9696
- People can still delete malicious files.
9797

98-
For detailed syntax and parameter information, see [Set-SPOTenant](/powershell/module/sharepoint-online/Set-SPOTenant).
98+
For detailed syntax and parameter information, see [Set-SPOTenant](/powershell/module/microsoft.online.sharepoint.powershell/set-spotenant).
9999

100100
## Step 3 (Recommended) Use the Microsoft Defender portal to create an alert policy for detected files
101101

@@ -169,7 +169,7 @@ For detailed syntax and parameter information, see [New-ActivityAlert](/powershe
169169
Get-SPOTenant | Format-List DisallowInfectedFileDownload
170170
```
171171

172-
For detailed syntax and parameter information, see [Get-SPOTenant](/powershell/module/sharepoint-online/Set-SPOTenant).
172+
For detailed syntax and parameter information, see [Get-SPOTenant](/powershell/module/microsoft.online.sharepoint.powershell/get-spotenant).
173173

174174
- To verify you successfully configured an alert policy for detected files, use either of the following methods:
175175
- In the Microsoft Defender portal at <https://security.microsoft.com/alertpolicies>, select the alert policy, and verify the settings.

0 commit comments

Comments
 (0)