diff --git a/Group Policies Objects/Default Domain Policy/Windows Copilot.md b/Group Policies Objects/Default Domain Policy/*Windows Copilot.md similarity index 66% rename from Group Policies Objects/Default Domain Policy/Windows Copilot.md rename to Group Policies Objects/Default Domain Policy/*Windows Copilot.md index 1de4bff..6941c8a 100644 --- a/Group Policies Objects/Default Domain Policy/Windows Copilot.md +++ b/Group Policies Objects/Default Domain Policy/*Windows Copilot.md @@ -2,4 +2,6 @@ `User Configuration\Administrative Templates\Windows Components\Windows Copilot` +**This somehow still doesn't show up in the latest policy template + - Turn off Windows Copilot -> Enabled \ No newline at end of file diff --git a/Group Policies Objects/Default Domain Policy/Windows Defender SmartScreen.md b/Group Policies Objects/Default Domain Policy/Windows Defender SmartScreen.md index 2dcaaae..69b0418 100644 --- a/Group Policies Objects/Default Domain Policy/Windows Defender SmartScreen.md +++ b/Group Policies Objects/Default Domain Policy/Windows Defender SmartScreen.md @@ -3,10 +3,4 @@ `Computer Configuration\Administrative Templates\Windows Components\Windows Defender SmartScreen` - Enhanced Phishing Protection -> Service Enabled -> Disabled (**Does not show on Windows Server 2022 by default**) - -**For a corporate scenario or when you cannot trust the user you are configuring it for and you choose to have SmartScreen enabled, do the followings:**, - -- Explorer -> Configure Windows Defender SmartScreen -> Enabled -> Warn and prevent bypass -- Microsoft Edge -> Prevent bypassing Windows Defender SmartScreen prompts for sites -> Enabled - -There is also Explorer -> Configure App Install Control that you might want to look into. Probably theatre though, it doesn't appear to block anything, or anything meaningful at least. +- Microsoft Edge -> Configure Windows Defender SmartScreen -> Disabled