Skip to content

Commit bd7c4d8

Browse files
authored
Merge branch 'main' into v-mathavale-9343792-7
2 parents 966b2ea + d8b065c commit bd7c4d8

File tree

4 files changed

+5
-4
lines changed

4 files changed

+5
-4
lines changed

defender-endpoint/device-control-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,8 @@ Device control capabilities from Microsoft can be organized into three main cate
5959
- Granular access control - create policies to control access by device, device type, operation (read, write, execute), user group, network location, or file type.
6060
- Reporting and advanced hunting - complete visibility into add device related activities.
6161
- Device control in Microsoft Defender can be managed using Intune or [Group Policy](device-control-deploy-manage-gpo.md).
62-
- **Device control in Microsoft Defender and Intune**. Intune provides a rich experience for managing complex device control policies for organizations. You can configure and deploy device restriction settings in Defender for Endpoint, for example. See [Deploy and manage device control with Microsoft Intune](device-control-deploy-manage-intune.md).
62+
63+
- **Device control in Microsoft Defender and Intune**. Intune provides a rich experience for managing complex device control policies for organizations. You can configure and deploy device restriction settings in Defender for Endpoint, for example. See [Deploy and manage device control with Microsoft Intune](device-control-deploy-manage-intune.md).
6364

6465
- **Endpoint data loss prevention** (Endpoint DLP). Endpoint DLP monitors sensitive information on devices that are onboarded to Microsoft Purview solutions. DLP policies can enforce protective actions on sensitive information and where it's stored or used. Endpoint DLP can capture file evidence. [Learn about Endpoint DLP](/purview/endpoint-dlp-learn-about).
6566

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ All our updates contain:
108108

109109
### What's new
110110

111-
- Added a new parameter to get-mppreference cmdlet (ControlledFolderAccessDefaultProtectedFolders) to show default protected folders for Controlled Folder Access (CFA).
111+
- Added a new parameter (`ControlledFolderAccessDefaultProtectedFolders`) to [Get-MpPreference](/powershell/module/defender/get-mppreference) cmdlet to show default protected folders for [controlled folder access](enable-controlled-folders.md).
112112
- Fixed an issue with device control regarding printer security checks.
113113
- Resolved an issue with platform rollback after an upgrade from Windows 10 to Windows 11.
114114
- Fixed an issue where volume exclusions weren't properly enforced in real-time protection after the completion of OOBE.

defender-endpoint/tune-performance-defender-antivirus.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
audience: ITPro
77
author: denisebmsft
88
ms.author: deniseb
9-
ms.date: 06/26/2024
9+
ms.date: 09/20/2024
1010
manager: deniseb
1111
ms.collection:
1212
- m365-security

defender-vulnerability-management/windows-authenticated-scan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: conceptual
1010
ms.service: defender-vuln-mgmt
1111
ms.localizationpriority: medium
12-
ms.date: 05/12/2022
12+
ms.date: 09/20/2024
1313
ms.collection:
1414
- m365-security
1515
- Tier1

0 commit comments

Comments
 (0)