Skip to content

Commit e12a187

Browse files
committed
Adjusted alignment and added missing periods
1 parent f0cdf5d commit e12a187

File tree

2 files changed

+27
-27
lines changed

2 files changed

+27
-27
lines changed

defender-endpoint/evaluate-mda-using-mde-security-settings-management.md

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -142,28 +142,28 @@ To enable Attack Surface Reduction (ASR) rules using the endpoint security polic
142142
1. On the **Configuration settings** page, expand the groups of settings and configure those settings you want to manage with this profile.
143143
1. Set the policies based on the following recommended settings:
144144

145-
|Description |Setting |
146-
|---------|---------|
147-
|Block executable content from email client and webmail | Block |
148-
|Block Adobe Reader from creating child processes | Block |
149-
|Block execution of potentially obfuscated scripts | Block |
150-
|Block abuse of exploited vulnerable signed drivers (Device) | Block |
151-
|Block Win32 API calls from Office macros | Block |
152-
|Block executable files from running unless they meet a prevalence, age, or trusted list criterion | Block |
153-
|Block Office communication application from creating child processes | Block |
154-
|Block all Office applications from creating child processes | Block |
155-
|[PREVIEW] Block use of copied or impersonated system tools | Block |
156-
|Block JavaScript or VBScript from launching downloaded executable content | Block |
157-
|Block credential stealing from the Windows local security authority subsystem | Block |
158-
|Block Webshell creation for Servers | Block |
159-
|Block Office applications from creating executable content | Block |
160-
|Block untrusted and unsigned processes that run from USB | Block |
161-
|Block Office applications from injecting code into other processes | Block |
162-
|Block persistence through WMI event subscription | Block |
163-
|Use advanced protection against ransomware | Block |
164-
|Block process creations originating from PSExec and WMI commands | Block<br>NOTE:If you have Configuration Manager (formerly SCCM), or other management tools, that use WMI, you might need to set this to **Audit** instead of **Block**. |
165-
|[PREVIEW] Block rebooting machine in Safe Mode | Block |
166-
|Enable Controlled Folder Access | Enabled |
145+
|Description |Setting |
146+
|---------|---------|
147+
|Block executable content from email client and webmail | Block |
148+
|Block Adobe Reader from creating child processes | Block |
149+
|Block execution of potentially obfuscated scripts | Block |
150+
|Block abuse of exploited vulnerable signed drivers (Device) | Block |
151+
|Block Win32 API calls from Office macros | Block |
152+
|Block executable files from running unless they meet a prevalence, age, or trusted list criterion | Block |
153+
|Block Office communication application from creating child processes | Block |
154+
|Block all Office applications from creating child processes | Block |
155+
|[PREVIEW] Block use of copied or impersonated system tools | Block |
156+
|Block JavaScript or VBScript from launching downloaded executable content | Block |
157+
|Block credential stealing from the Windows local security authority subsystem | Block |
158+
|Block Webshell creation for Servers | Block |
159+
|Block Office applications from creating executable content | Block |
160+
|Block untrusted and unsigned processes that run from USB | Block |
161+
|Block Office applications from injecting code into other processes | Block |
162+
|Block persistence through WMI event subscription | Block |
163+
|Use advanced protection against ransomware | Block |
164+
|Block process creations originating from PSExec and WMI commands | Block<br>NOTE: If you have Configuration Manager (formerly SCCM), or other management tools, that use WMI, you might need to set this to **Audit** instead of **Block**. |
165+
|[PREVIEW] Block rebooting machine in Safe Mode | Block |
166+
|Enable Controlled Folder Access | Enabled |
167167

168168
> [!TIP]
169169
> Any of the rules may block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named “Attack Surface Reduction Only Exclusions”. And, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
@@ -175,9 +175,9 @@ To enable Attack Surface Reduction (ASR) rules using the endpoint security polic
175175

176176
#### Check the platform update version
177177

178-
The latest Platform Update version Production channel (GA) is available in [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623+update).
178+
The latest "Platform Update" version Production channel (GA) is available in [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623+update).
179179

180-
To check which "Platform Update version you have installed, run the following command in PowerShell using the privileges of an administrator:
180+
To check which "Platform Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
181181

182182
`get-mpComputerStatus | ft AMProductVersion`
183183

defender-endpoint/mac-install-with-intune.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -403,7 +403,7 @@ After completing the profile configuration, you'll be able to review the status
403403

404404
Once the Intune changes are propagated to the enrolled devices, you can see them listed under **Monitor** \> **Device status**:
405405

406-
:::image type="content" source="../defender-endpoint/media/mdatp-7-devicestatusblade.png" alt-text="Screenshot that shows the view of the device status" lightbox="../defender-endpoint/media/mdatp-7-devicestatusblade.png":::
406+
:::image type="content" source="../defender-endpoint/media/mdatp-7-devicestatusblade.png" alt-text="Screenshot that shows the view of the device status." lightbox="../defender-endpoint/media/mdatp-7-devicestatusblade.png":::
407407

408408
#### Client device setup
409409

@@ -431,11 +431,11 @@ A standard [Company Portal installation](/intune-user-help/enroll-your-device-in
431431

432432
:::image type="content" source="../defender-endpoint/media/mdatp-13-systempreferences.png" alt-text="Screenshot that shows the System preferences page." lightbox="../defender-endpoint/media/mdatp-13-systempreferences.png":::
433433

434-
:::image type="content" source="../defender-endpoint/media/mdatp-14-systempreferencesprofiles.png" alt-text="Screenshot that shows the System Preferences Profiles page" lightbox="../defender-endpoint/media/mdatp-14-systempreferencesprofiles.png":::
434+
:::image type="content" source="../defender-endpoint/media/mdatp-14-systempreferencesprofiles.png" alt-text="Screenshot that shows the System Preferences Profiles page." lightbox="../defender-endpoint/media/mdatp-14-systempreferencesprofiles.png":::
435435

436436
2. Verify that the following configuration profiles are present and installed. The **Management Profile** should be the Intune system profile. _Wdav-config_ and _wdav-kext_ are system configuration profiles that were added in Intune:
437437

438-
:::image type="content" source="../defender-endpoint/media/mdatp-15-managementprofileconfig.png" alt-text="Screenshot that shows the Profiles page" lightbox="../defender-endpoint/media/mdatp-15-managementprofileconfig.png":::
438+
:::image type="content" source="../defender-endpoint/media/mdatp-15-managementprofileconfig.png" alt-text="Screenshot that shows the Profiles page." lightbox="../defender-endpoint/media/mdatp-15-managementprofileconfig.png":::
439439

440440
3. You should also see the Microsoft Defender for Endpoint icon in the top-right corner.
441441

0 commit comments

Comments
 (0)