mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-20 04:43:37 +00:00
update threat protection report and make machine status report
This commit is contained in:
Binary file not shown.
After Width: | Height: | Size: 112 KiB |
@ -0,0 +1,64 @@
|
||||
---
|
||||
title: Machine status report in Windows Defender ATP
|
||||
description: Track machine sensor health state, antivirus status, OS platforms, and versions using the machine status report
|
||||
keywords: sensor helath state, antivirus status, os platforms, versions
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
search.appverid: met150
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: mjcaparas
|
||||
ms.localizationpriority: medium
|
||||
---
|
||||
|
||||
# Machine status report in Windows Defender ATP
|
||||
|
||||
**Applies to:**
|
||||
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf)
|
||||
|
||||
[!include[Prerelease information](prerelease.md)]
|
||||
|
||||
The machines status report provides high-level information about the devices in your organization. The report includes trending information showing the sensor health state, antivirus status, OS platforms, and Windows 10 versions.
|
||||
|
||||
|
||||
The dashboard is structured into two columns:
|
||||
|
||||
|
||||
Section | Description
|
||||
:---|:---
|
||||
1 | Status over time
|
||||
2 | Status (last 6 months)
|
||||
|
||||
|
||||
## Machine attributes
|
||||
The report is made up of cards that display the following alert attributes:
|
||||
|
||||
- **Sensor health state**: shows information about the sensor state on devices, providing an aggregated view of devices that are active, experiencing impaired communications, inactive, or where no sensor data is seen.
|
||||
|
||||
|
||||
- **Antivirus status**: shows the status of the antivirus product in machines.
|
||||
|
||||
|
||||
- **OS platforms**: shows the distribution of OS platforms that exists within your organization.
|
||||
|
||||
- **Windows 10 versions**: shows the number of Windows 10 machines and their versions in your organization.
|
||||
|
||||
|
||||
## Date range for status over time
|
||||
|
||||
By default, the status over time column displays machine information from the 30-day period ending in the latest full day. To adjust this, select a time range from the drop-down options.
|
||||
|
||||
|
||||
## Filter data
|
||||
|
||||
Use the provided filters to include or exclude alerts with certain attributes.
|
||||
|
||||
>[!NOTE]
|
||||
>These filters apply to **all** the cards in the report.
|
||||
|
||||
For example, to show data about Windows 10 machines only:
|
||||
|
||||
1. Under **Filters > OS platforms**, select **Windows 10**
|
||||
2. Ensure that all other options under **OS platforms** are deselected.
|
||||
3. Select **Apply**.
|
@ -10,7 +10,6 @@ ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: mjcaparas
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 11/07/2018
|
||||
---
|
||||
|
||||
# Threat protection report in Windows Defender ATP
|
||||
@ -20,35 +19,42 @@ ms.date: 11/07/2018
|
||||
|
||||
[!include[Prerelease information](prerelease.md)]
|
||||
|
||||
The threat protection report provides high-level information about alerts generated in your organization. The report includes trending information showing the detection sources, categories, severities, statuses, classifications, and determinations of alerts across time as well as the last full day.
|
||||
The threat protection report provides high-level information about alerts generated in your organization. The report includes trending information showing the detection sources, categories, severities, statuses, classifications, and determinations of alerts across time.
|
||||
|
||||
The dashboard is structured into two columns:
|
||||
|
||||

|
||||
|
||||
Section | Description
|
||||
:---|:---
|
||||
1 | Alerts over time
|
||||
2 | Alert distribution (last 6 months)
|
||||
|
||||
|
||||
## Alert attributes
|
||||
The report is made up of cards that display the following alert attributes:
|
||||
|
||||
- **Alert detection sources**: shows information about the sensors and detection technologies that provide the data used by Windows Defender ATP to trigger alerts.
|
||||
- **Detection sources**: shows information about the sensors and detection technologies that provide the data used by Windows Defender ATP to trigger alerts.
|
||||
|
||||
- **Alerts by categories**: shows the types of threat or attack activity that triggered alerts, indicating possible focus areas for your security operations.
|
||||
- **Threat categories**: shows the types of threat or attack activity that triggered alerts, indicating possible focus areas for your security operations.
|
||||
|
||||
- **Alerts by severity**: shows the severity level of alerts, indicating the collective potential impact of threats to your organization and the level of response needed to address them.
|
||||
- **Severity**: shows the severity level of alerts, indicating the collective potential impact of threats to your organization and the level of response needed to address them.
|
||||
|
||||
- **Alert status**: shows the resolution status of alerts, indicating the efficiency of your manual alert responses and of automated remediation (if enabled).
|
||||
- **Status**: shows the resolution status of alerts, indicating the efficiency of your manual alert responses and of automated remediation (if enabled).
|
||||
|
||||
- **Alert classification & determination**: shows how you have classified alerts upon resolution, whether you have classified them as actual threats (true alerts) or as incorrect detections (false alerts). These cards also show the determination of resolved alerts, providing additional insight like the types of actual threats found or the legitimate activities that were incorrectly detected.
|
||||
- **Classification & determination**: shows how you have classified alerts upon resolution, whether you have classified them as actual threats (true alerts) or as incorrect detections (false alerts). These cards also show the determination of resolved alerts, providing additional insight like the types of actual threats found or the legitimate activities that were incorrectly detected.
|
||||
|
||||
## 30-day and today cards
|
||||
For each of the described alert attributes, the report provides two cards:
|
||||
- **30-day cards**: shows daily trending information from a 30-day period
|
||||
- **Today cards**: shows 24-hour snapshot information from the latest completed or full day
|
||||
## Date range for alerts over time
|
||||
|
||||
## Set start date of 30-day cards
|
||||
|
||||
By default, the 30-day cards in the report display data from the 30-day period ending in the latest full day. To adjust this 30-day window, select a different start date under **Filters > Start date for 30-day cards**.
|
||||
|
||||
For example, to show the period from December 1 to December 30, select December 1 as the start date. Select **Apply** after adjusting the start date.
|
||||
By default, the alerts over time column displays alert information from the 30-day period ending in the latest full day. To adjust this, select a time range from the drop-down options.
|
||||
|
||||
|
||||
## Filter data
|
||||
|
||||
Use the provided filters to include or exclude alerts with certain attributes. These filters apply to all the cards in the report.
|
||||
Use the provided filters to include or exclude alerts with certain attributes.
|
||||
|
||||
>[!NOTE]
|
||||
>These filters apply to **all** the cards in the report.
|
||||
|
||||
For example, to show data about high-severity alerts only:
|
||||
|
||||
|
Reference in New Issue
Block a user