mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-18 08:17:23 +00:00
more updates
This commit is contained in:
parent
5033454f55
commit
2334f8cb79
@ -30,7 +30,7 @@
|
|||||||
#### [Overview](microsoft-defender-atp/manage-atp-post-migration.md)
|
#### [Overview](microsoft-defender-atp/manage-atp-post-migration.md)
|
||||||
#### [Intune](microsoft-defender-atp/manage-atp-post-migration-intune.md)
|
#### [Intune](microsoft-defender-atp/manage-atp-post-migration-intune.md)
|
||||||
#### [Configuration Manager](microsoft-defender-atp/manage-atp-post-migration-configuration-manager.md)
|
#### [Configuration Manager](microsoft-defender-atp/manage-atp-post-migration-configuration-manager.md)
|
||||||
#### [Group Policy Objects](microsoft-defender-atp/manage-atp-post-migration-powershell.md)
|
#### [Group Policy Objects](microsoft-defender-atp/manage-atp-post-migration-group-policy-objects.md)
|
||||||
#### [PowerShell, WMI, and MPCmdRun.exe](microsoft-defender-atp/manage-atp-post-migration-other-tools.md)
|
#### [PowerShell, WMI, and MPCmdRun.exe](microsoft-defender-atp/manage-atp-post-migration-other-tools.md)
|
||||||
|
|
||||||
## [Security administration]()
|
## [Security administration]()
|
||||||
|
@ -21,7 +21,7 @@ ms.topic: article
|
|||||||
|
|
||||||
We recommend using Configuration Manager to manage threat protection features for the devices (also referred to as endpoints) within your organization.
|
We recommend using Configuration Manager to manage threat protection features for the devices (also referred to as endpoints) within your organization.
|
||||||
|
|
||||||
## Configuring Microsoft Defender ATP with Configuration Manager
|
## Configure Microsoft Defender ATP with Configuration Manager
|
||||||
|
|
||||||
The following table lists various tasks you can perform to configure Microsoft Defender ATP with Configuration Manager.
|
The following table lists various tasks you can perform to configure Microsoft Defender ATP with Configuration Manager.
|
||||||
|
|
||||||
@ -31,18 +31,3 @@ The following table lists various tasks you can perform to configure Microsoft D
|
|||||||
|task |link |
|
|task |link |
|
||||||
|
|
||||||
|
|
||||||
## Find your Microsoft Defender ATP settings in Configuration Manager
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> You must be a global administrator or service administrator in Configuration Manager to configure the settings described in this article. To learn more, see link.
|
|
||||||
|
|
||||||
1. Go to the where and sign in.
|
|
||||||
|
|
||||||
2. Under what choose what.
|
|
||||||
|
|
||||||
3. next
|
|
||||||
|
|
||||||
4. and next
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> Need help? See link.
|
|
@ -21,17 +21,17 @@ ms.topic: article
|
|||||||
|
|
||||||
We recommend using Intune to manage your threat protection features in Microsoft Defender ATP. However, you can
|
We recommend using Intune to manage your threat protection features in Microsoft Defender ATP. However, you can
|
||||||
|
|
||||||
## Configuring Microsoft Defender ATP with PowerShell
|
## Configure Microsoft Defender ATP with PowerShell
|
||||||
|
|
||||||
You can use PowerShell to manage Microsoft Defender Antivirus, exploit protection, and your attack surface reduction rules.
|
You can use PowerShell to manage Microsoft Defender Antivirus, exploit protection, and your attack surface reduction rules.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Configuring Microsoft Defender ATP with Windows Management Instrumentation (WMI)
|
## Configure Microsoft Defender ATP with Windows Management Instrumentation (WMI)
|
||||||
|
|
||||||
steps
|
steps
|
||||||
|
|
||||||
## Configuring Microsoft Defender ATP with Microsoft Malware Protection Command Line Utility (MPCmdRun.exe)
|
## Configure Microsoft Defender ATP with Microsoft Malware Protection Command Line Utility (MPCmdRun.exe)
|
||||||
|
|
||||||
steps
|
steps
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user