Skip to content

Commit d78116a

Browse files
committed
Acrolinx score enhancement
1 parent 27881b1 commit d78116a

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

defender-endpoint/customize-exploit-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ search.appverid: met150
2727

2828
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
2929
30-
Exploit protection automatically applies a number of exploit mitigation techniques on both the operating system processes and on individual apps.
30+
Exploit protection automatically applies many exploit mitigation techniques on both the operating system processes and on individual apps.
3131

3232
Configure these settings using the Windows Security app on an individual device. Then, export the configuration as an XML file so you can deploy to other devices. Use Group Policy to distribute the XML file to multiple devices at once. You can also configure the mitigations with PowerShell.
3333

@@ -42,7 +42,7 @@ It also describes how to enable or configure the mitigations using Windows Secur
4242

4343
All mitigations can be configured for individual apps. Some mitigations can also be applied at the operating system level.
4444

45-
You can set each of the mitigations on, off, or to their default value. Some mitigations have additional options that are indicated in the description in the table.
45+
You can set each of the mitigations on, off, or to their default value. Some mitigations have more options that are indicated in the description in the table.
4646

4747
Default values are always specified in brackets at the **Use default** option for each mitigation. In the following example, the default for Data Execution Prevention is "On".
4848

defender-endpoint/exclude-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ You can choose to exclude a single device or multiple devices at the same time.
6161
You can also exclude a device from its device page.
6262

6363
> [!NOTE]
64-
> Excluding active devices is not recommended, since it is especially risky to not have visibility into their vulnerability info. If a device is active and you try to exclude it, you'll get a warning message and a confirmation pop-up asking if you are sure you want to exclude an active device.
64+
> Excluding active devices isn't recommended, since it's especially risky to not have visibility into their vulnerability info. If a device is active and you try to exclude it, you'll get a warning message and a confirmation pop-up asking if you're sure you want to exclude an active device.
6565
6666
It can take up to 10 hours for a device to be fully excluded from vulnerability management views and data.
6767

0 commit comments

Comments
 (0)