Perform a final review of all policy settings before deployment to ensure correct configuration.
Click Next to reach the "Review + create" page. This page displays a comprehensive summary of your policy configuration.
Review Checklist
Verify the following settings are correct:
- Policy name: Clear and descriptive
- Platform: Windows 10 and later
- Ransomware protection: Set to "Block" (or your chosen level)
- Tamper protection: Enabled
- Cloud protection: High level
- Target groups: Appropriate device groups selected
- Exclusions: Minimal and justified
Policy Configuration Summary
{
"policyName": "Advanced Ransomware Protection - Windows Devices",
"platform": "Windows 10 and later",
"profileType": "Endpoint protection",
"ransomwareProtection": "Block",
"tamperProtection": "Enabled",
"cloudProtection": "High",
"assignedGroups": ["All Windows Devices"],
"excludedGroups": []
}
Once you've verified all settings:
- Click Create to deploy the policy
- The policy will be created and begin deploying to assigned devices
- You'll be redirected to the policy overview page
Warning: Once created, the policy immediately begins deploying to assigned devices. Ensure all settings are correct before clicking Create, as changes require policy updates.
Verification: The policy appears in the Configuration profiles list with a "Deployment status" showing the rollout progress to target devices.