Skip to content

Commit b346d64

Browse files
committed
acrolinx edits
1 parent c2cee12 commit b346d64

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

defender-endpoint/schedule-antivirus-scans-wmi.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ RandomizeScheduleTaskTimes
4545

4646
For more information and allowed parameters, see [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal)
4747

48-
## WMI for scheduling scans when an endpoint is not in use
48+
## WMI for scheduling scans when an endpoint isn't in use
4949

5050
Use the [Set method of the MSFT_MpPreference class](/previous-versions/windows/desktop/legacy/dn455323(v=vs.85)) for the following properties:
5151

@@ -56,7 +56,7 @@ ScanOnlyIfIdleEnabled
5656
For more information about APIs and allowed parameters, see [Windows Defender WMIv2 APIs](/previous-versions/windows/desktop/defender/windows-defender-wmiv2-apis-portal).
5757

5858
> [!NOTE]
59-
> When you schedule scans for times when endpoints are not in use, scans do not honor the CPU throttling configuration and will take full advantage of the resources available to complete the scan as fast as possible.
59+
> When you schedule scans for times when endpoints aren't in use, scans don't honor the CPU throttling configuration and will take full advantage of the resources available to complete the scan as fast as possible.
6060
6161

6262
## WMI for scheduling scans to complete remediation

defender-endpoint/troubleshoot-problems-with-tamper-protection.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ sections:
2727
- question: |
2828
Tamper protection is preventing my security team from managing a device. What should we do?
2929
answer: |
30-
If your IT or security team is prevented from performing a necessary task on a device, consider using [troubleshooting mode](enable-troubleshooting-mode.md). After troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.
30+
If your IT or security team is prevented from performing a necessary task on a device, consider using [troubleshooting mode](enable-troubleshooting-mode.md). After the troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.
3131
3232
- question: |
3333
Changes to Microsoft Defender Antivirus settings using Group Policy are ignored. Why is this happening, and what can we do about it?
@@ -36,7 +36,7 @@ sections:
3636
3737
Depending on your particular scenario, you have several options available:
3838
39-
- If you must make changes to a device and tamper protection is blocking those changes, you can use [troubleshooting mode](enable-troubleshooting-mode.md) to temporarily disable tamper protection on the device. After troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.
39+
- If you must make changes to a device and tamper protection is blocking those changes, you can use [troubleshooting mode](enable-troubleshooting-mode.md) to temporarily disable tamper protection on the device. After the troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.
4040
4141
- You can use Intune or Configuration Manager to exclude devices from tamper protection.
4242
@@ -55,9 +55,9 @@ sections:
5555
5656
2. Confirm that only Intune manages the device. Go to `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender` (or `HKLM\SOFTWARE\Microsoft\Windows Defender`), and look for a `REG_DWORD` entry called **ManagedDefenderProductType**.
5757
58-
- If **ManagedDefenderProductType** has a value of `6`, then the device is managed by Intune only (*this value is required to protect Microsoft Defender Antivirus exclusions*).
58+
- If ManagedDefenderProductType has a value of `6`, then the device is managed by Intune only (*this value is required to protect Microsoft Defender Antivirus exclusions*).
5959
60-
- If **ManagedDefenderProductType** has a value of `7`, then the device is co-managed, such as by Intune and Configuration Manager (*this value indicates that exclusions aren't currently tamper protected*).
60+
- If ManagedDefenderProductType has a value of `7`, then the device is co-managed, such as by Intune and Configuration Manager (*this value indicates that exclusions aren't currently tamper protected*).
6161
6262
3. Confirm that tamper protection is deployed and that Microsoft Defender Antivirus exclusions are protected. Go to `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features` (or `HKLM\SOFTWARE\Microsoft\Windows Defender\Features`), and look for a `REG_DWORD` entry called **TPExclusions**.
6363

0 commit comments

Comments
 (0)