You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-antivirus-using-powershell.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,9 +128,9 @@ Some rules might block behavior you find acceptable in your organization. In the
128
128
129
129
#### Enable Tamper Protection
130
130
131
-
In the Microsoft XDR portal (security.microsoft.com), go to Settings > Endpoints > Advanced features > Tamper Protection > On.
131
+
In the Microsoft XDR portal (security.microsoft.com), go to **Settings** > **Endpoints** > **Advanced features** > **Tamper Protection** > **On**.
132
132
133
-
For more information[How do I configure or manage tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection)
133
+
For more information, see [How do I configure or manage tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
134
134
135
135
#### Check the Cloud Protection network connectivity
136
136
@@ -144,7 +144,7 @@ cd "C:\Program Files\Windows Defender"
144
144
MpCmdRun.exe -ValidateMapsConnection
145
145
```
146
146
147
-
For more information[Use the cmdline tool to validate cloud-delivered protection ](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus)
147
+
For more information, see [Use the cmdline tool to validate cloud-delivered protection ](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus).
0 commit comments