Merge branch 'master' into kwekua-cortana
@ -1009,7 +1009,27 @@
|
|||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefilecertificateinfobeta-table.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefilecertificateinfobeta-table.md",
|
||||||
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefilecertificateinfo-table",
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicefilecertificateinfo-table",
|
||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-configassessment-table.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessment-table",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-secureconfigkb-table.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessmentkb-table",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwareinventory-table.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsoftwareinventoryvulnerabilities-table",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-tvm-softwarevulnerability-table.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-alertevents-table.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-alertevents-table.md",
|
||||||
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicealertevents-table",
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicealertevents-table",
|
||||||
|
@ -38,7 +38,7 @@ HoloLens 2 prompts a user to calibrate the device under the following circumstan
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
During this process, you'll look at a set of targets (gems). It's fine if you blink or close your eyes during calibration but try not to stare at other objects in the room. This allows HoloLens to learn about your eye position to render your holographic world.
|
During this process, you'll look at a set of targets (gems). It's fine if you blink during calibration, but try to stay focused on the gems instead of other objects in the room. This allows HoloLens to learn about your eye position to render your holographic world.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -52,7 +52,7 @@ If calibration was successful, you'll see a success screen. If not, read more a
|
|||||||
|
|
||||||
### Calibration when sharing a device or session
|
### Calibration when sharing a device or session
|
||||||
|
|
||||||
Multiple users can share a HoloLens 2 device, without a need for each person to go through device setup. When a new user puts the device on their head for th first time, HoloLens 2 automatically prompts the user to calibrate visuals. When a user that has previously calibrated visuals puts the device on their head, the display seamlessly adjusts for quality and a comfortable viewing experience.
|
Multiple users can share a HoloLens 2 device, without a need for each person to go through device setup. When a new user puts the device on their head for the first time, HoloLens 2 automatically prompts the user to calibrate visuals. When a user that has previously calibrated visuals puts the device on their head, the display seamlessly adjusts for quality and a comfortable viewing experience.
|
||||||
|
|
||||||
### Manually starting the calibration process
|
### Manually starting the calibration process
|
||||||
|
|
||||||
@ -84,7 +84,7 @@ If calibration is unsuccessful try:
|
|||||||
- Moving objects in your visor out of the way (such as hair)
|
- Moving objects in your visor out of the way (such as hair)
|
||||||
- Turning on a light in your room or moving out of direct sunlight
|
- Turning on a light in your room or moving out of direct sunlight
|
||||||
|
|
||||||
If you followed all guidelines and calibration is still failing, please let us know by filing feedback in [Feedback Hub](hololens-feedback.md).
|
If you followed all guidelines and calibration is still failing, you can disable the calibration prompt in Settings. Please also let us know by filing feedback in [Feedback Hub](hololens-feedback.md).
|
||||||
|
|
||||||
Note that setting IPD is not applicable for Hololens 2, since eye positions are computed by the system.
|
Note that setting IPD is not applicable for Hololens 2, since eye positions are computed by the system.
|
||||||
|
|
||||||
@ -92,6 +92,8 @@ Note that setting IPD is not applicable for Hololens 2, since eye positions are
|
|||||||
|
|
||||||
Calibration information is stored locally on the device and is not associated with any account information. There is no record of who has used the device without calibration. This mean new users will get prompted to calibrate visuals when they use the device for the first time, as well as users who opted out of calibration previously or if calibration was unsuccessful.
|
Calibration information is stored locally on the device and is not associated with any account information. There is no record of who has used the device without calibration. This mean new users will get prompted to calibrate visuals when they use the device for the first time, as well as users who opted out of calibration previously or if calibration was unsuccessful.
|
||||||
|
|
||||||
|
The device can locally store up to 50 calibration profiles. After this number is reached, the device automatically deletes the oldest unused profile.
|
||||||
|
|
||||||
Calibration information can always be deleted from the device in **Settings** > **Privacy** > **Eye tracker**.
|
Calibration information can always be deleted from the device in **Settings** > **Privacy** > **Eye tracker**.
|
||||||
|
|
||||||
### Disable calibration
|
### Disable calibration
|
||||||
|
@ -37,7 +37,7 @@ This update is specific to the Surface Hub 2S and provides the driver and firmwa
|
|||||||
* Improves system stability.
|
* Improves system stability.
|
||||||
* Surface System driver - 1.7.139.0
|
* Surface System driver - 1.7.139.0
|
||||||
* Improves system stability.
|
* Improves system stability.
|
||||||
* Surface SMC Firmware update - 1.173.139.0
|
* Surface SMC Firmware update - 1.176.139.0
|
||||||
* Improves system stability.
|
* Improves system stability.
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
@ -39,7 +39,7 @@ An example of Microsoft Intune Windows Encryption settings is shown below.
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
Note that a device which is encrypted automatically will need to be decrypted prior to changing the encyption algorithm.
|
Note that a device which is encrypted automatically will need to be decrypted prior to changing the encryption algorithm.
|
||||||
|
|
||||||
The settings are available under Device Configuration -> Profiles -> Create profile -> Platform = Windows 10 and later, Profile type = Endpoint protection -> Configure -> Windows Encryption -> BitLocker base settings, Configure encryption methods = Enable.
|
The settings are available under Device Configuration -> Profiles -> Create profile -> Platform = Windows 10 and later, Profile type = Endpoint protection -> Configure -> Windows Encryption -> BitLocker base settings, Configure encryption methods = Enable.
|
||||||
|
|
||||||
|
@ -94,7 +94,7 @@ If the Microsoft Store is not accessible, the AutoPilot process will still conti
|
|||||||
Windows Autopilot depends on specific capabilities available in Windows 10 and Azure Active Directory. It also requires an MDM service such as Microsoft Intune. These capabilities can be obtained through various editions and subscription programs:
|
Windows Autopilot depends on specific capabilities available in Windows 10 and Azure Active Directory. It also requires an MDM service such as Microsoft Intune. These capabilities can be obtained through various editions and subscription programs:
|
||||||
|
|
||||||
To provide needed Azure Active Directory (automatic MDM enrollment and company branding features) and MDM functionality, one of the following is required:
|
To provide needed Azure Active Directory (automatic MDM enrollment and company branding features) and MDM functionality, one of the following is required:
|
||||||
- [Microsoft 365 Business subscriptions](https://www.microsoft.com/microsoft-365/business)
|
- [Microsoft 365 Business Premium subscriptions](https://www.microsoft.com/microsoft-365/business)
|
||||||
- [Microsoft 365 F1 subscriptions](https://www.microsoft.com/microsoft-365/enterprise/firstline)
|
- [Microsoft 365 F1 subscriptions](https://www.microsoft.com/microsoft-365/enterprise/firstline)
|
||||||
- [Microsoft 365 Academic A1, A3, or A5 subscriptions](https://www.microsoft.com/education/buy-license/microsoft365/default.aspx)
|
- [Microsoft 365 Academic A1, A3, or A5 subscriptions](https://www.microsoft.com/education/buy-license/microsoft365/default.aspx)
|
||||||
- [Microsoft 365 Enterprise E3 or E5 subscriptions](https://www.microsoft.com/microsoft-365/enterprise), which include all Windows 10, Office 365, and EM+S features (Azure AD and Intune).
|
- [Microsoft 365 Enterprise E3 or E5 subscriptions](https://www.microsoft.com/microsoft-365/enterprise), which include all Windows 10, Office 365, and EM+S features (Azure AD and Intune).
|
||||||
|
@ -21,14 +21,14 @@ ms.reviewer:
|
|||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10, version 1703 or later
|
- Windows 10, version 1703 or later
|
||||||
- Hybrid deployment
|
- Hybrid deployment
|
||||||
- Certificate trust
|
- Key trust
|
||||||
|
|
||||||
|
|
||||||
## Directory Synchronization
|
## Directory Synchronization
|
||||||
|
|
||||||
In hybrid deployments, users register the public portion of their Windows Hello for Business credential with Azure. Azure AD Connect synchronizes the Windows Hello for Business public key to Active Directory.
|
In hybrid deployments, users register the public portion of their Windows Hello for Business credential with Azure. Azure AD Connect synchronizes the Windows Hello for Business public key to Active Directory.
|
||||||
|
|
||||||
The key-trust model needs Windows Server 2016 domain controllers, which configures the key registration permissions automatically; however, the certificate-trust model does not and requires you to add the permissions manually.
|
The key-trust model needs Windows Server 2016 domain controllers, which configure the key registration permissions automatically; however, the certificate-trust model does not and requires you to add the permissions manually.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> If you already have a Windows Server 2016 domain controller in your domain, you can skip **Configure Permissions for Key Synchronization**. In this case, you should use the pre-created group KeyAdmins in step 3 of the "Group Memberships for the Azure AD Connect Service Account" section of this article.
|
> If you already have a Windows Server 2016 domain controller in your domain, you can skip **Configure Permissions for Key Synchronization**. In this case, you should use the pre-created group KeyAdmins in step 3 of the "Group Memberships for the Azure AD Connect Service Account" section of this article.
|
||||||
@ -61,6 +61,9 @@ Sign-in a domain controller or management workstation with _Domain Admin_ equiva
|
|||||||
5. In the **Enter the object names to select** text box, type the name of the Azure AD Connect service account. Click **OK**.
|
5. In the **Enter the object names to select** text box, type the name of the Azure AD Connect service account. Click **OK**.
|
||||||
6. Click **OK** to return to **Active Directory Users and Computers**.
|
6. Click **OK** to return to **Active Directory Users and Computers**.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> If your AD forest has multiple domains. Please make sure you add the ADConnect sync service account (that is, MSOL_12121212) into "Enterprise Key Admins" group to gain permission across the domains in the forest.
|
||||||
|
|
||||||
### Section Review
|
### Section Review
|
||||||
|
|
||||||
> [!div class="checklist"]
|
> [!div class="checklist"]
|
||||||
|
@ -351,10 +351,10 @@
|
|||||||
##### [DeviceNetworkEvents](microsoft-defender-atp/advanced-hunting-devicenetworkevents-table.md)
|
##### [DeviceNetworkEvents](microsoft-defender-atp/advanced-hunting-devicenetworkevents-table.md)
|
||||||
##### [DeviceProcessEvents](microsoft-defender-atp/advanced-hunting-deviceprocessevents-table.md)
|
##### [DeviceProcessEvents](microsoft-defender-atp/advanced-hunting-deviceprocessevents-table.md)
|
||||||
##### [DeviceRegistryEvents](microsoft-defender-atp/advanced-hunting-deviceregistryevents-table.md)
|
##### [DeviceRegistryEvents](microsoft-defender-atp/advanced-hunting-deviceregistryevents-table.md)
|
||||||
##### [DeviceTvmSoftwareInventoryVulnerabilities](microsoft-defender-atp/advanced-hunting-tvm-softwareinventory-table.md)
|
##### [DeviceTvmSoftwareInventoryVulnerabilities](microsoft-defender-atp/advanced-hunting-devicetvmsoftwareinventoryvulnerabilities-table.md)
|
||||||
##### [DeviceTvmSoftwareVulnerabilitiesKB](microsoft-defender-atp/advanced-hunting-tvm-softwarevulnerability-table.md)
|
##### [DeviceTvmSoftwareVulnerabilitiesKB](microsoft-defender-atp/advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md)
|
||||||
##### [DeviceTvmSecureConfigurationAssessment](microsoft-defender-atp/advanced-hunting-tvm-configassessment-table.md)
|
##### [DeviceTvmSecureConfigurationAssessment](microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessment-table.md)
|
||||||
##### [DeviceTvmSecureConfigurationAssessmentKB](microsoft-defender-atp/advanced-hunting-tvm-secureconfigkb-table.md)
|
##### [DeviceTvmSecureConfigurationAssessmentKB](microsoft-defender-atp/advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md)
|
||||||
#### [Apply query best practices](microsoft-defender-atp/advanced-hunting-best-practices.md)
|
#### [Apply query best practices](microsoft-defender-atp/advanced-hunting-best-practices.md)
|
||||||
|
|
||||||
### [Microsoft Threat Experts](microsoft-defender-atp/microsoft-threat-experts.md)
|
### [Microsoft Threat Experts](microsoft-defender-atp/microsoft-threat-experts.md)
|
||||||
|
BIN
windows/security/threat-protection/images/lab-creation-page.png
Normal file
After Width: | Height: | Size: 135 KiB |
@ -22,30 +22,34 @@ ms.topic: article
|
|||||||
|
|
||||||
- Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
- Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
||||||
|
|
||||||
|
|
||||||
## API description
|
## API description
|
||||||
|
|
||||||
Adds or remove tag to a specific [Machine](machine.md).
|
Adds or remove tag to a specific [Machine](machine.md).
|
||||||
|
|
||||||
|
|
||||||
## Limitations
|
## Limitations
|
||||||
|
|
||||||
1. You can post on machines last seen in the past 30 days.
|
1. You can post on machines last seen in the past 30 days.
|
||||||
|
|
||||||
2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
|
2. Rate limitations for this API are 100 calls per minute and 1500 calls per hour.
|
||||||
|
|
||||||
|
|
||||||
## Permissions
|
## Permissions
|
||||||
|
|
||||||
One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md)
|
One of the following permissions is required to call this API. To learn more, including how to choose permissions, see [Use Microsoft Defender ATP APIs](apis-intro.md)
|
||||||
|
|
||||||
Permission type | Permission | Permission display name
|
Permission type | Permission | Permission display name
|
||||||
:---|:---|:---
|
:---|:---|:---
|
||||||
Application | Machine.ReadWrite.All | 'Read and write all machine information'
|
Application | Machine.ReadWrite.All | 'Read and write all machine information'
|
||||||
Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine information'
|
Delegated (work or school account) | Machine.ReadWrite | 'Read and write machine information'
|
||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
> When obtaining a token using user credentials:
|
> When obtaining a token using user credentials:
|
||||||
>- The user needs to have at least the following role permission: 'Manage security setting' (See [Create and manage roles](user-roles.md) for more information)
|
>
|
||||||
|
>- The user needs to have at least the following role permission: 'Manage security setting'. For more (See [Create and manage roles](user-roles.md) for more information)
|
||||||
>- User needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
>- User needs to have access to the machine, based on machine group settings (See [Create and manage machine groups](machine-groups.md) for more information)
|
||||||
|
|
||||||
## HTTP request
|
## HTTP request
|
||||||
|
|
||||||
```
|
```
|
||||||
POST https://api.securitycenter.windows.com/api/machines/{id}/tags
|
POST https://api.securitycenter.windows.com/api/machines/{id}/tags
|
||||||
```
|
```
|
||||||
@ -58,17 +62,18 @@ Authorization | String | Bearer {token}. **Required**.
|
|||||||
Content-Type | string | application/json. **Required**.
|
Content-Type | string | application/json. **Required**.
|
||||||
|
|
||||||
## Request body
|
## Request body
|
||||||
|
|
||||||
In the request body, supply a JSON object with the following parameters:
|
In the request body, supply a JSON object with the following parameters:
|
||||||
|
|
||||||
Parameter | Type | Description
|
Parameter | Type | Description
|
||||||
:---|:---|:---
|
:---|:---|:---
|
||||||
Value | String | The tag name. **Required**.
|
Value | String | The tag name. **Required**.
|
||||||
Action | Enum | Add or Remove. Allowed values are: 'Add' or 'Remove'. **Required**.
|
Action | Enum | Add or Remove. Allowed values are: 'Add' or 'Remove'. **Required**.
|
||||||
|
|
||||||
|
|
||||||
## Response
|
## Response
|
||||||
If successful, this method returns 200 - Ok response code and the updated Machine in the response body.
|
|
||||||
|
|
||||||
|
If successful, this method returns 200 - Ok response code and the updated Machine in the response body.
|
||||||
|
|
||||||
## Example
|
## Example
|
||||||
|
|
||||||
|
@ -48,10 +48,10 @@ Table and column names are also listed within the Microsoft Defender Security Ce
|
|||||||
| **[DeviceImageLoadEvents](advanced-hunting-deviceimageloadevents-table.md)** | DLL loading events |
|
| **[DeviceImageLoadEvents](advanced-hunting-deviceimageloadevents-table.md)** | DLL loading events |
|
||||||
| **[DeviceEvents](advanced-hunting-deviceevents-table.md)** | Multiple event types, including events triggered by security controls such as Windows Defender Antivirus and exploit protection |
|
| **[DeviceEvents](advanced-hunting-deviceevents-table.md)** | Multiple event types, including events triggered by security controls such as Windows Defender Antivirus and exploit protection |
|
||||||
| **[DeviceFileCertificateInfo](advanced-hunting-devicefilecertificateinfo-table.md)** | Certificate information of signed files obtained from certificate verification events on endpoints |
|
| **[DeviceFileCertificateInfo](advanced-hunting-devicefilecertificateinfo-table.md)** | Certificate information of signed files obtained from certificate verification events on endpoints |
|
||||||
| **[DeviceTvmSoftwareInventoryVulnerabilities](advanced-hunting-tvm-softwareinventory-table.md)** | Inventory of software on devices as well as any known vulnerabilities in these software products |
|
| **[DeviceTvmSoftwareInventoryVulnerabilities](advanced-hunting-devicetvmsoftwareinventoryvulnerabilities-table.md)** | Inventory of software on devices as well as any known vulnerabilities in these software products |
|
||||||
| **[DeviceTvmSoftwareVulnerabilitiesKB ](advanced-hunting-tvm-softwarevulnerability-table.md)** | Knowledge base of publicly disclosed vulnerabilities, including whether exploit code is publicly available |
|
| **[DeviceTvmSoftwareVulnerabilitiesKB ](advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md)** | Knowledge base of publicly disclosed vulnerabilities, including whether exploit code is publicly available |
|
||||||
| **[DeviceTvmSecureConfigurationAssessment](advanced-hunting-tvm-configassessment-table.md)** | Threat & Vulnerability Management assessment events, indicating the status of various security configurations on devices |
|
| **[DeviceTvmSecureConfigurationAssessment](advanced-hunting-devicetvmsecureconfigurationassessment-table.md)** | Threat & Vulnerability Management assessment events, indicating the status of various security configurations on devices |
|
||||||
| **[DeviceTvmSecureConfigurationAssessmentKB](advanced-hunting-tvm-secureconfigkb-table.md)** | Knowledge base of various security configurations used by Threat & Vulnerability Management to assess devices; includes mappings to various standards and benchmarks |
|
| **[DeviceTvmSecureConfigurationAssessmentKB](advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md)** | Knowledge base of various security configurations used by Threat & Vulnerability Management to assess devices; includes mappings to various standards and benchmarks |
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
- [Advanced hunting overview](advanced-hunting-overview.md)
|
- [Advanced hunting overview](advanced-hunting-overview.md)
|
||||||
|
@ -23,36 +23,45 @@ ms.topic: article
|
|||||||
|
|
||||||
Conducting a comprehensive security product evaluation can be a complex process requiring cumbersome environment and machine configuration before an end-to-end attack simulation can actually be done. Adding to the complexity is the challenge of tracking where the simulation activities, alerts, and results are reflected during the evaluation.
|
Conducting a comprehensive security product evaluation can be a complex process requiring cumbersome environment and machine configuration before an end-to-end attack simulation can actually be done. Adding to the complexity is the challenge of tracking where the simulation activities, alerts, and results are reflected during the evaluation.
|
||||||
|
|
||||||
The Microsoft Defender ATP evaluation lab is designed to eliminate the complexities of machine and environment configuration so that you can focus on evaluating the capabilities of the platform, running simulations, and seeing the prevention, detection, and remediation features in action.
|
The Microsoft Defender ATP evaluation lab is designed to eliminate the complexities of machine and environment configuration so that you can focus on evaluating the capabilities of the platform, running simulations, and seeing the prevention, detection, and remediation features in action.
|
||||||
|
|
||||||
When you get started with the lab, you'll be guided through a simple set-up process where you can specify the type of configuration that best suits your needs.
|
|
||||||
|
|
||||||
After the lab setup process is complete, you can add Windows 10 or Windows Server 2019 machines. These test machines come pre-configured to have the latest and greatest OS versions with the right security components in place and Office 2019 Standard installed.
|
|
||||||
|
|
||||||
With the simplified set-up experience, you can focus on running your own test scenarios and the pre-made simulations to see how Microsoft Defender ATP performs.
|
With the simplified set-up experience, you can focus on running your own test scenarios and the pre-made simulations to see how Microsoft Defender ATP performs.
|
||||||
|
|
||||||
You'll have full access to all the powerful capabilities of the platform such as automated investigations, advanced hunting, and threat analytics, allowing you to test the comprehensive protection stack that Microsoft Defender ATP offers.
|
You'll have full access to the powerful capabilities of the platform such as automated investigations, advanced hunting, and threat analytics, allowing you to test the comprehensive protection stack that Microsoft Defender ATP offers.
|
||||||
|
|
||||||
|
You can add Windows 10 or Windows Server 2019 machines that come pre-configured to have the latest OS versions and the right security components in place as well as Office 2019 Standard installed.
|
||||||
|
|
||||||
|
You can also install threat simulators. Microsoft Defender ATP has partnered with industry leading threat simulation platforms to help you test out the Microsoft Defender ATP capabilities without having to leave the portal.
|
||||||
|
|
||||||
|
Install your preferred simulator, run scenarios within the evaluation lab, and instantly see how the platform performs - all conveniently available at no extra cost to you. You'll also have convenient access to wide array of simulations which you can access and run from the simulations catalog.
|
||||||
|
|
||||||
|
|
||||||
## Before you begin
|
## Before you begin
|
||||||
You'll need to fulfill the [licensing requirements](minimum-requirements.md#licensing-requirements) or have trial access to Microsoft Defender ATP to access the evaluation lab.
|
You'll need to fulfill the [licensing requirements](minimum-requirements.md#licensing-requirements) or have trial access to Microsoft Defender ATP to access the evaluation lab.
|
||||||
|
|
||||||
|
You must have **Manage security settings** permissions to:
|
||||||
|
- Create the lab
|
||||||
|
- Create machines
|
||||||
|
- Reset password
|
||||||
|
- Create simulations
|
||||||
|
|
||||||
|
For more information, see [Create and manage roles](user-roles.md).
|
||||||
|
|
||||||
Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink)
|
Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink)
|
||||||
|
|
||||||
|
|
||||||
## Get started with the lab
|
## Get started with the lab
|
||||||
You can access the lab from the menu. In the navigation menu, select **Evaluation and tutorials > Evaluation lab**.
|
You can access the lab from the menu. In the navigation menu, select **Evaluation and tutorials > Evaluation lab**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
When you access the evaluation lab for the first time, you'll find an introduction page with a link to the evaluation guide. The guide contains tips and recommendations to keep in mind when evaluating an advanced threat protection product.
|
|
||||||
|
|
||||||
It's a good idea to read the guide before starting the evaluation process so that you can conduct a thorough assessment of the platform.
|
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>- Each environment is provisioned with a limited set of test machines.
|
>- Each environment is provisioned with a limited set of test machines.
|
||||||
>- Depending the type of environment structure you select, machines will be available for the specified number of hours from the day of activation.
|
>- Depending the type of environment structure you select, machines will be available for the specified number of hours from the day of activation.
|
||||||
>- When you've used up the provisioned machines, no new machines are provided. A deleted machine does not refresh the available test machine count.
|
>- When you've used up the provisioned machines, no new machines are provided. A deleted machine does not refresh the available test machine count.
|
||||||
>- Given the limited resources, it’s advisable to use the machines carefully.
|
>- Given the limited resources, it’s advisable to use the machines carefully.
|
||||||
|
|
||||||
|
Already have a lab? Make sure to enable the new threat simulators and have active machines.
|
||||||
|
|
||||||
## Setup the evaluation lab
|
## Setup the evaluation lab
|
||||||
|
|
||||||
@ -60,17 +69,37 @@ It's a good idea to read the guide before starting the evaluation process so tha
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Depending on your evaluation needs, you can choose to setup an environment with fewer machines for a longer period or more machines for a shorter period. Select your preferred lab configuration then select **Create lab**.
|
2. Depending on your evaluation needs, you can choose to setup an environment with fewer machines for a longer period or more machines for a shorter period. Select your preferred lab configuration then select **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
When the environment completes the setup process, you're ready to add machines.
|
|
||||||
|
3. (Optional) You can choose to install threat simulators in the lab.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>You'll first need to accept and provide consent to the terms and information sharing statements.
|
||||||
|
|
||||||
|
4. Select the threat simulation agent you'd like to use and enter your details. You can also choose to install threat simulators at a later time. If you choose to install threat simulation agents during the lab setup, you'll enjoy the benefit of having them conveniently installed on the machines you add.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. Review the summary and select **Setup lab**.
|
||||||
|
|
||||||
|
After the lab setup process is complete, you can add machines and run simulations.
|
||||||
|
|
||||||
|
|
||||||
## Add machines
|
## Add machines
|
||||||
When you add a machine to your environment, Microsoft Defender ATP sets up a well-configured machine with connection details. You can add Windows 10 or Windows Server 2019 machines.
|
When you add a machine to your environment, Microsoft Defender ATP sets up a well-configured machine with connection details. You can add Windows 10 or Windows Server 2019 machines.
|
||||||
|
|
||||||
The machine will be configured with the most up-to-date version of the OS and Office 2019 Standard as well as other apps such as Java, Python, and SysIntenals.
|
The machine will be configured with the most up-to-date version of the OS and Office 2019 Standard as well as other apps such as Java, Python, and SysIntenals.
|
||||||
|
|
||||||
|
>[!TIP]
|
||||||
|
> Need more machines in your lab? Submit a support ticket to have your request reviewed by the Microsoft Defender ATP team.
|
||||||
|
|
||||||
|
If you chose to add a threat simulator during the lab setup, all machines will have the threat simulator agent installed in the machines that you add.
|
||||||
|
|
||||||
The machine will automatically be onboarded to your tenant with the recommended Windows security components turned on and in audit mode - with no effort on your side.
|
The machine will automatically be onboarded to your tenant with the recommended Windows security components turned on and in audit mode - with no effort on your side.
|
||||||
|
|
||||||
The following security components are pre-configured in the test machines:
|
The following security components are pre-configured in the test machines:
|
||||||
@ -94,9 +123,6 @@ Automated investigation settings will be dependent on tenant settings. It will b
|
|||||||
|
|
||||||
1. From the dashboard, select **Add machine**.
|
1. From the dashboard, select **Add machine**.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
|
||||||
2. Choose the type of machine to add. You can choose to add Windows 10 or Windows Server 2019.
|
2. Choose the type of machine to add. You can choose to add Windows 10 or Windows Server 2019.
|
||||||
|
|
||||||

|

|
||||||
@ -114,20 +140,31 @@ Automated investigation settings will be dependent on tenant settings. It will b
|
|||||||
|
|
||||||
4. Machine set up begins. This can take up to approximately 30 minutes.
|
4. Machine set up begins. This can take up to approximately 30 minutes.
|
||||||
|
|
||||||
The environment will reflect your test machine status through the evaluation - including risk score, exposure score, and alerts created through the simulation.
|
5. See the status of test machines, the risk and exposure levels, and the status of simulator installations by selecting the **Machines** tab.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
>[!TIP]
|
||||||
|
>In the **Simulator status** column, you can hover over the information icon to know the installation status of an agent.
|
||||||
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## Simulate attack scenarios
|
## Simulate attack scenarios
|
||||||
Use the test machines to run attack simulations by connecting to them.
|
Use the test machines to run your own attack simulations by connecting to them.
|
||||||
|
|
||||||
If you are looking for a pre-made simulation, you can use our ["Do It Yourself" attack scenarios](https://securitycenter.windows.com/tutorials). These scripts are safe, documented, and easy to use. These scenarios will reflect Microsoft Defender ATP capabilities and walk you through investigation experience.
|
You can simulate attack scenarios using:
|
||||||
|
- The ["Do It Yourself" attack scenarios](https://securitycenter.windows.com/tutorials)
|
||||||
|
- Threat simulators
|
||||||
|
|
||||||
You can also use [Advanced hunting](advanced-hunting-query-language.md) to query data and [Threat analytics](threat-analytics.md) to view reports about emerging threats.
|
You can also use [Advanced hunting](advanced-hunting-query-language.md) to query data and [Threat analytics](threat-analytics.md) to view reports about emerging threats.
|
||||||
|
|
||||||
> [!NOTE]
|
### Do-it-yourself attack scenarios
|
||||||
> The connection to the test machines is done using RDP. Make sure that your firewall settings allow RDP connections.
|
If you are looking for a pre-made simulation, you can use our ["Do It Yourself" attack scenarios](https://securitycenter.windows.com/tutorials). These scripts are safe, documented, and easy to use. These scenarios will reflect Microsoft Defender ATP capabilities and walk you through investigation experience.
|
||||||
|
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>The connection to the test machines is done using RDP. Make sure that your firewall settings allow RDP connections.
|
||||||
|
|
||||||
1. Connect to your machine and run an attack simulation by selecting **Connect**.
|
1. Connect to your machine and run an attack simulation by selecting **Connect**.
|
||||||
|
|
||||||
@ -146,20 +183,70 @@ You can also use [Advanced hunting](advanced-hunting-query-language.md) to query
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
4. Run simulations on the machine.
|
4. Run Do-it-yourself attack simulations on the machine.
|
||||||
|
|
||||||
|
|
||||||
|
### Threat simulator scenarios
|
||||||
|
If you chose to install any of the supported threat simulators during the lab setup, you can run the built-in simulations on the evaluation lab machines.
|
||||||
|
|
||||||
|
|
||||||
|
Running threat simulations using third-party platforms is a good way to evaluate Microsoft Defender ATP capabilities within the confines of a lab environment.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Before you can run simulations, ensure the following requirements are met:
|
||||||
|
>- Machines must be added to the evaluation lab
|
||||||
|
>- Threat simulators must be installed in the evaluation lab
|
||||||
|
|
||||||
|
1. From the portal select **Create simulation**.
|
||||||
|
|
||||||
|
2. Select a threat simulator.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Choose a simulation or look through the simulation gallery to browse through the available simulations.
|
||||||
|
|
||||||
|
You can get to the simulation gallery from:
|
||||||
|
- The main evaluation dashboard in the **Simulations overview** tile or
|
||||||
|
- By navigating from the navigation pane **Evaluation and tutorials** > **Simulation & tutorials**, then select **Simulations catalog**.
|
||||||
|
|
||||||
|
4. Select the devices where you'd like to run the simulation on.
|
||||||
|
|
||||||
|
5. Select **Create simulation**.
|
||||||
|
|
||||||
|
6. View the progress of a simulation by selecting the **Simulations** tab. View the simulation state, active alerts, and other details.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
After running your simulations, we encourage you to walk through the lab progress bar and explore Microsoft Defender ATP features. See if the attack simulations you ran triggered an automated investigation and remediation, check out the evidence collected and analyzed by the feature.
|
||||||
|
|
||||||
After running your simulations, we encourage you to walk through the lab progress bar and explore Microsoft Defender ATP features. See if your attacks triggered an automated investigation and remediation, check out the evidence collected and analyzed by the feature.
|
|
||||||
|
|
||||||
|
|
||||||
Hunt for attack evidence through advanced hunting by using the rich query language and raw telemetry and check out some world-wide threats documented in Threat analytics.
|
Hunt for attack evidence through advanced hunting by using the rich query language and raw telemetry and check out some world-wide threats documented in Threat analytics.
|
||||||
|
|
||||||
|
|
||||||
## Simulation results
|
## Simulation gallery
|
||||||
Get a full overview of the simulation results, all in one place, allowing you to drill down to the relevant pages with every detail you need.
|
Microsoft Defender ATP has partnered with various threat simulation platforms to give you convenient access to test the capabilities of the platform right from the within the portal.
|
||||||
|
|
||||||
View the machine details page by selecting the machine from the table. You'll be able to drill down on relevant alerts and investigations by exploring the rich context provided on the attack simulation.
|
View all the available simulations by going to **Simulations and tutorials** > **Simulations catalog** from the menu.
|
||||||
|
|
||||||
### Evaluation report
|
|
||||||
|
A list of supported third-party threat simulation agents are listed, and specific types of simulations along with detailed descriptions are provided on the catalog.
|
||||||
|
|
||||||
|
You can conveniently run any available simulation right from the catalog.
|
||||||
|
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Each simulation comes with an in-depth description of the attack scenario and references such as the MITRE attack techniques used and sample Advanced hunting queries you run.
|
||||||
|
|
||||||
|
**Examples:**
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
## Evaluation report
|
||||||
The lab reports summarize the results of the simulations conducted on the machines.
|
The lab reports summarize the results of the simulations conducted on the machines.
|
||||||
|
|
||||||

|

|
||||||
@ -172,6 +259,7 @@ At a glance, you'll quickly be able to see:
|
|||||||
- Detection sources
|
- Detection sources
|
||||||
- Automated investigations
|
- Automated investigations
|
||||||
|
|
||||||
|
|
||||||
## Provide feedback
|
## Provide feedback
|
||||||
Your feedback helps us get better in protecting your environment from advanced attacks. Share your experience and impressions from product capabilities and evaluation results.
|
Your feedback helps us get better in protecting your environment from advanced attacks. Share your experience and impressions from product capabilities and evaluation results.
|
||||||
|
|
||||||
|
Before Width: | Height: | Size: 138 KiB After Width: | Height: | Size: 100 KiB |
After Width: | Height: | Size: 173 KiB |
Before Width: | Height: | Size: 44 KiB After Width: | Height: | Size: 135 KiB |
After Width: | Height: | Size: 70 KiB |
After Width: | Height: | Size: 291 KiB |
After Width: | Height: | Size: 55 KiB |
Before Width: | Height: | Size: 47 KiB After Width: | Height: | Size: 113 KiB |
After Width: | Height: | Size: 204 KiB |
After Width: | Height: | Size: 169 KiB |
After Width: | Height: | Size: 105 KiB |
After Width: | Height: | Size: 279 KiB |
@ -47,6 +47,8 @@ Turn on the preview experience setting to be among the first to try upcoming fea
|
|||||||
## Preview features
|
## Preview features
|
||||||
|
|
||||||
The following features are included in the preview release:
|
The following features are included in the preview release:
|
||||||
|
- [Attack simulators in the evaluation lab](evaluation-lab.md#threat-simulator-scenarios) <br> Microsoft Defender ATP has partnered with various threat simulation platforms to give you convenient access to test the capabilities of the platform right from the within the portal.
|
||||||
|
|
||||||
- [Create indicators for certificates](manage-indicators.md) <br> Create indicators to allow or block certificates.
|
- [Create indicators for certificates](manage-indicators.md) <br> Create indicators to allow or block certificates.
|
||||||
|
|
||||||
- [Microsoft Defender ATP for Linux](microsoft-defender-atp-linux.md) <br> Microsoft Defender ATP now adds support for Linux. Learn how to install, configure, update, and use Microsoft Defender ATP for Linux.
|
- [Microsoft Defender ATP for Linux](microsoft-defender-atp-linux.md) <br> Microsoft Defender ATP now adds support for Linux. Learn how to install, configure, update, and use Microsoft Defender ATP for Linux.
|
||||||
|
@ -88,5 +88,4 @@ crl.microsoft.com`
|
|||||||
- `https://static2.sharepointonline.com`
|
- `https://static2.sharepointonline.com`
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
- [Validate licensing provisioning and complete setup for Microsoft Defender ATP](licensing.md)
|
|
||||||
|