You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-antivirus-using-powershell.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -116,7 +116,7 @@ Exploit protection provides features that help protect devices from known malici
116
116
|---|---|
117
117
|Prevent malicious and suspicious apps (such as ransomware) from making changes to protected folders with Controlled folder access|`Set-MpPreference -EnableControlledFolderAccess Enabled`|
118
118
|Block connections to known bad IP addresses and other network connections with [Network protection](network-protection.md)|`Set-MpPreference -EnableNetworkProtection Enabled`|
119
-
|Apply a standard set of mitigations with [Exploit protection](exploit-protection.md)|`Invoke-WebRequest`<br/>`https://demo.wd.microsoft.com/Content/ProcessMitigation.xml -OutFile ProcessMitigation.xml`<br/>`Set-ProcessMitigation -PolicyFilePath ProcessMitigation.xml`|
119
+
|Apply a standard set of mitigations with [Exploit protection](exploit-protection.md)|`Invoke-WebRequest`<br/><br/>`https://demo.wd.microsoft.com/Content/ProcessMitigation.xml -OutFile ProcessMitigation.xml`<br/><br/>`Set-ProcessMitigation -PolicyFilePath ProcessMitigation.xml`|
Some rules might block behavior you find acceptable in your organization. In these cases, change the rule from `Enabled` to `Audit` to prevent unwanted blocks.
0 commit comments