Skip to content

Commit f4edd20

Browse files
authored
Fixed alignment and fixed a typo
1 parent f347b85 commit f4edd20

File tree

1 file changed

+20
-20
lines changed

1 file changed

+20
-20
lines changed

defender-endpoint/evaluate-mda-using-mde-security-settings-management.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -49,24 +49,24 @@ To configure the options that you must use to test the protection features, perf
4949
1. From these groups of settings, select those settings that you want to manage with this profile.
5050
1. Set the policies for the chosen groups of settings by configuring the settings as described in the following tables:
5151

52-
**Real-time Protection (Always-on protection, real-time scanning)**:
52+
**Real-time Protection (Always-on protection, real-time scanning)**:
5353

54-
|Description|Settings|
55-
|---|---|
56-
|Allow Real-time Monitoring|Allowed|
57-
|Real Time Scan Direction|Monitor all files (bi-directional)|
58-
|Allow Behavior Monitoring|Allowed|
59-
|Allow On Access Protection|Allowed|
60-
|PUA Protection|PUA Protection on|
54+
|Description|Settings|
55+
|---|---|
56+
|Allow Real-time Monitoring|Allowed|
57+
|Real Time Scan Direction|Monitor all files (bi-directional)|
58+
|Allow Behavior Monitoring|Allowed|
59+
|Allow On Access Protection|Allowed|
60+
|PUA Protection|PUA Protection on|
6161

62-
**Cloud protection features**:
62+
**Cloud protection features**:
6363

64-
|Description|Setting|
65-
|---|---|
66-
|Allow Cloud Protection|Allowed|
67-
|Cloud Block Level|High|
68-
|Cloud Extended Time-out|Configured, 50|
69-
|Submit Samples Consent|Send all samples automatically|
64+
|Description|Setting|
65+
|---|---|
66+
|Allow Cloud Protection|Allowed|
67+
|Cloud Block Level|High|
68+
|Cloud Extended Time-out|Configured, 50|
69+
|Submit Samples Consent|Send all samples automatically|
7070

7171
Standard security intelligence updates can take hours to prepare and deliver; our cloud-delivered protection service can deliver this protection in seconds. For more information, see [Use next-gen technologies in Microsoft Defender Antivirus through cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md).
7272

@@ -169,7 +169,7 @@ To enable Attack Surface Reduction (ASR) rules using the endpoint security polic
169169
|Enable Controlled Folder Access|Enabled|
170170

171171
> [!TIP]
172-
> Any of the rules might block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named "Attack Surface Reduction Only Exclusions." Additionally, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
172+
> Any of the rules might block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named "Attack Surface Reduction Only Exclusions." Additionally, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
173173
174174
1. Select **Next**.
175175
2. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
@@ -187,11 +187,11 @@ To enable Attack Surface Reduction (ASR) rules using the endpoint security polic
187187
1. Select **Next**.
188188
1. On the **Configuration settings** page, expand the groups of settings.
189189
1. From these groups, select the settings that you want to manage with this profile.
190-
1. Set the policies for the chosen groups of settings by configuring the them as described in the following tables:
190+
1. Set the policies for the chosen groups of settings by configuring them as described in the following table:
191191

192-
|Description| Setting|
193-
| -------- | -------- |
194-
| TamperProtection (Device) | On|
192+
|Description| Setting|
193+
| -------- | -------- |
194+
| TamperProtection (Device) | On|
195195

196196
#### Check the Cloud Protection network connectivity
197197

0 commit comments

Comments
 (0)