mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-16 07:17:24 +00:00
Merging changes synced from https://github.com/MicrosoftDocs/windows-docs-pr (branch live)
This commit is contained in:
commit
23e1e195a4
@ -27,6 +27,7 @@ The following features and functionalities have been removed from the installed
|
||||
|
||||
|Feature | Details and mitigation | Removed in version |
|
||||
| ----------- | --------------------- | ------ |
|
||||
| Rinna and Japanese Address suggestion | The Rinna and Japanese Address suggestion service for Microsoft Japanese Input Method Editor (IME) will end on August 13th, 2020. For more information, see [Rinna and Japanese Address suggestion will no longer be offered](https://support.microsoft.com/help/4576767/windows-10-rinna-and-japanese-address-suggestion) | 8/13/2020 |
|
||||
| Cortana | Cortana has been updated and enhanced in the Windows 10 May 2020 Update. With [these changes](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-2004#cortana), some previously available consumer skills such as music, connected home, and other non-Microsoft skills are no longer available. | 2004 |
|
||||
| Windows To Go | Windows To Go was announced as deprecated in Windows 10, version 1903 and is removed in this release. | 2004 |
|
||||
| Mobile Plans and Messaging apps | Both apps are still supported, but are now distributed in a different way. OEMs can now include these apps in Windows images for cellular enabled devices. The apps are removed for non-cellular devices.| 2004 |
|
||||
|
@ -101,6 +101,75 @@ You can use Group Policy (GP) to configure settings, such as settings for the sa
|
||||
> If you don't set a value, the default value is to enable sample collection.
|
||||
|
||||
|
||||
## Other recommended configuration settings
|
||||
|
||||
### Update endpoint protection configuration
|
||||
|
||||
After configuring the onboarding script, continue editing the same group policy to add endpoint protection configurations. Perform group policy edits from a system running Windows 10 or Server 2019 to ensure you have all of the required Microsoft Defender Antivirus capabilities. You may need to close and reopen the group policy object to register the Defender ATP configuration settings.
|
||||
|
||||
All policies are located under `Computer Configuration\Policies\Administrative Templates`.
|
||||
|
||||
**Policy location:** \Windows Components\Windows Defender ATP
|
||||
|
||||
Policy | Setting
|
||||
:---|:---
|
||||
Enable\Disable Sample collection| Enabled - "Enable sample collection on machines" checked
|
||||
|
||||
|
||||
**Policy location:** \Windows Components\Windows Defender Antivirus
|
||||
|
||||
Policy | Setting
|
||||
:---|:---
|
||||
Configure detection for potentially unwanted applications | Enabled, Block
|
||||
|
||||
**Policy location:** \Windows Components\Windows Defender Antivirus\MAPS
|
||||
|
||||
Policy | Setting
|
||||
:---|:---
|
||||
Join Microsoft MAPS | Enabled, Advanced MAPS
|
||||
Send file samples when further analysis is required | Enabled, Send safe samples
|
||||
|
||||
**Policy location:** \Windows Components\Windows Defender Antivirus\Real-time Protection
|
||||
|
||||
Policy | Setting
|
||||
:---|:---
|
||||
Turn off real-time protection|Disabled
|
||||
Turn on behavior monitoring|Enabled
|
||||
Scan all downloaded files and attachments|Enabled
|
||||
Monitor file and program activity on your computer|Enabled
|
||||
|
||||
|
||||
**Policy location:** \Windows Components\Windows Defender Antivirus\Scan
|
||||
|
||||
These settings configure periodic scans of the endpoint. We recommend performing a weekly quick scan, performance permitting.
|
||||
|
||||
Policy | Setting
|
||||
:---|:---
|
||||
Check for the latest virus and spyware security intelligence before running a scheduled scan |Enabled
|
||||
|
||||
|
||||
|
||||
**Policy location:** \Windows Components\Windows Defender Antivirus\Windows Defender Exploit Guard\Attack Surface Reduction
|
||||
|
||||
Get the current list of attack surface reduction GUIDs from [Customize attack surface reduction rules](customize-attack-surface-reduction.md)
|
||||
|
||||
1. Open the **Configure Attack Surface Reduction** policy.
|
||||
2. Select **Enabled**.
|
||||
3. Select the **Show…** button.
|
||||
4. Add each GUID in the **Value Name** field with a Value of 2.
|
||||
|
||||
This will set each up for audit only.
|
||||
|
||||

|
||||
|
||||
|
||||
|
||||
Policy | Setting
|
||||
:---|:---
|
||||
Configure Controlled folder access| Enabled, Audit Mode
|
||||
|
||||
|
||||
|
||||
## Offboard devices using Group Policy
|
||||
For security reasons, the package used to Offboard devices will expire 30 days after the date it was downloaded. Expired offboarding packages sent to a device will be rejected. When downloading an offboarding package you will be notified of the packages expiry date and it will also be included in the package name.
|
||||
|
||||
|
@ -15,7 +15,6 @@ manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
ms.date: 12/06/2018
|
||||
---
|
||||
|
||||
# Onboard Windows 10 devices using Mobile Device Management tools
|
||||
@ -51,6 +50,8 @@ For more information on using Microsoft Defender ATP CSP see, [WindowsAdvancedTh
|
||||
>[!TIP]
|
||||
> After onboarding the device, you can choose to run a detection test to verify that a device is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender ATP device](run-detection-test.md).
|
||||
|
||||
|
||||
|
||||
## Offboard and monitor devices using Mobile Device Management tools
|
||||
For security reasons, the package used to Offboard devices will expire 30 days after the date it was downloaded. Expired offboarding packages sent to a device will be rejected. When downloading an offboarding package you will be notified of the packages expiry date and it will also be included in the package name.
|
||||
|
||||
|
@ -28,17 +28,24 @@ ms.date: 02/07/2020
|
||||
|
||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configureendpointssccm-abovefoldlink)
|
||||
|
||||
<span id="sccm1606"/>
|
||||
## Supported client operating systems
|
||||
|
||||
## Onboard Windows 10 devices using Microsoft Endpoint Configuration Manager current branch
|
||||
Based on the version of Configuration Manager you're running, the following client operating systems can be onboarded:
|
||||
|
||||
Configuration Manager current branch has integrated support to configure and manage Microsoft Defender ATP on managed devices. For more information, see [Microsoft Defender Advanced Threat Protection in Microsoft Endpoint Configuration Manager current branch](https://docs.microsoft.com/configmgr/protect/deploy-use/windows-defender-advanced-threat-protection).
|
||||
#### Configuration Manager version 1910 and prior
|
||||
|
||||
<span id="sccm1602"/>
|
||||
- Clients computers running Windows 10, version 1607 and later
|
||||
|
||||
## Onboard Windows 10 devices using earlier versions of System Center Configuration Manager
|
||||
#### Configuration Manager version 2002 and later
|
||||
|
||||
You can use existing Configuration Manager functionality to create a policy to configure your devices. This action is supported in System Center 2012 R2 Configuration Manager.
|
||||
Starting in Configuration Manager version 2002, you can onboard the following operating systems:
|
||||
|
||||
- Windows 8.1
|
||||
- Windows 10, version 1607 or later
|
||||
- Windows Server 2012 R2
|
||||
- Windows Server 2016
|
||||
- Windows Server 2016, version 1803 or later
|
||||
- Windows Server 2019
|
||||
|
||||
### Onboard devices using System Center Configuration Manager
|
||||
|
||||
@ -50,7 +57,7 @@ You can use existing Configuration Manager functionality to create a policy to c
|
||||
|
||||
c. In the **Deployment method** field, select **System Center Configuration Manager 2012/2012 R2/1511/1602**.
|
||||
|
||||
d. Click **Download package**, and save the .zip file.
|
||||
d. Select **Download package**, and save the .zip file.
|
||||
|
||||
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATPOnboardingScript.cmd*.
|
||||
|
||||
@ -75,7 +82,11 @@ For more information, see [Configure Detection Methods in System Center 2012 R2
|
||||
|
||||
For each device, you can set a configuration value to state whether samples can be collected from the device when a request is made through Microsoft Defender Security Center to submit a file for deep analysis.
|
||||
|
||||
You can set a compliance rule for configuration item in System Center Configuration Manager to change the sample share setting on a device.
|
||||
>[!NOTE]
|
||||
>These configuration settings are typically done through Configuration Manager.
|
||||
|
||||
You can set a compliance rule for configuration item in Configuration Manager to change the sample share setting on a device.
|
||||
|
||||
This rule should be a *remediating* compliance rule configuration item that sets the value of a registry key on targeted devices to make sure they’re complaint.
|
||||
|
||||
The configuration is set through the following registry key entry:
|
||||
@ -93,13 +104,49 @@ Possible values are:
|
||||
|
||||
The default value in case the registry key doesn’t exist is 1.
|
||||
|
||||
For more information about System Center Configuration Manager Compliance see [Introduction to compliance settings in System Center 2012 R2 Configuration Manager](https://docs.microsoft.com/previous-versions/system-center/system-center-2012-R2/gg682139\(v=technet.10\)).
|
||||
For more information about System Center Configuration Manager Compliance, see [Introduction to compliance settings in System Center 2012 R2 Configuration Manager](https://docs.microsoft.com/previous-versions/system-center/system-center-2012-R2/gg682139\(v=technet.10\)).
|
||||
|
||||
|
||||
## Other recommended configuration settings
|
||||
After onboarding devices to the service, it's important to take advantage of the included threat protection capabilities by enabling them with the following recommended configuration settings.
|
||||
|
||||
### Device collection configuration
|
||||
If you're using Endpoint Configuration Manager, version 2002 or later, you can choose to broaden the deployment to include servers or down-level clients.
|
||||
|
||||
|
||||
### Next generation protection configuration
|
||||
The following configuration settings are recommended:
|
||||
|
||||
**Scan** <br>
|
||||
- Scan removable storage devices such as USB drives: Yes
|
||||
|
||||
**Real-time Protection** <br>
|
||||
- Enable Behavioral Monitoring: Yes
|
||||
- Enable protection against Potentially Unwanted Applications at download and prior to installation: Yes
|
||||
|
||||
**Cloud Protection Service**
|
||||
- Cloud Protection Service membership type: Advanced membership
|
||||
|
||||
**Attack surface reduction**
|
||||
Configure all available rules to Audit.
|
||||
|
||||
>[!NOTE]
|
||||
> Blocking these activities may interrupt legitimate business processes. The best approach is setting everything to audit, identifying which ones are safe to turn on, and then enabling those settings on endpoints which do not have false positive detections.
|
||||
|
||||
|
||||
**Network protection** <br>
|
||||
Prior to enabling network protection in audit or block mode, ensure that you've installed the antimalware platform update, which can be obtained from the [support page](https://support.microsoft.com/en-us/help/4560203/windows-defender-anti-malware-platform-binaries-are-missing).
|
||||
|
||||
|
||||
**Controlled folder access**<br>
|
||||
Enable the feature in audit mode for at least 30 days. After this period, review detections and create a list of applications that are allowed to write to protected directories.
|
||||
|
||||
For more information, see [Evaluate controlled folder access](evaluate-controlled-folder-access.md).
|
||||
|
||||
|
||||
## Offboard devices using Configuration Manager
|
||||
|
||||
For security reasons, the package used to Offboard devices will expire 30 days after the date it was downloaded. Expired offboarding packages sent to an device will be rejected. When downloading an offboarding package you will be notified of the packages expiry date and it will also be included in the package name.
|
||||
For security reasons, the package used to Offboard devices will expire 30 days after the date it was downloaded. Expired offboarding packages sent to a device will be rejected. When downloading an offboarding package, you will be notified of the packages expiry date and it will also be included in the package name.
|
||||
|
||||
> [!NOTE]
|
||||
> Onboarding and offboarding policies must not be deployed on the same device at the same time, otherwise this will cause unpredictable collisions.
|
||||
@ -118,7 +165,7 @@ If you use Microsoft Endpoint Configuration Manager current branch, see [Create
|
||||
|
||||
c. In the **Deployment method** field, select **System Center Configuration Manager 2012/2012 R2/1511/1602**.
|
||||
|
||||
d. Click **Download package**, and save the .zip file.
|
||||
d. Select **Download package**, and save the .zip file.
|
||||
|
||||
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATPOffboardingScript_valid_until_YYYY-MM-DD.cmd*.
|
||||
|
||||
@ -144,13 +191,13 @@ If you're using System Center 2012 R2 Configuration Manager, monitoring consists
|
||||
|
||||
1. In the Configuration Manager console, click **Monitoring** at the bottom of the navigation pane.
|
||||
|
||||
2. Click **Overview** and then **Deployments**.
|
||||
2. Select **Overview** and then **Deployments**.
|
||||
|
||||
3. Click on the deployment with the package name.
|
||||
3. Select on the deployment with the package name.
|
||||
|
||||
4. Review the status indicators under **Completion Statistics** and **Content Status**.
|
||||
|
||||
If there are failed deployments (devices with **Error**, **Requirements Not Met**, or **Failed statuses**), you may need to troubleshoot the devices. For more information see, [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md).
|
||||
If there are failed deployments (devices with **Error**, **Requirements Not Met**, or **Failed statuses**), you may need to troubleshoot the devices. For more information, see, [Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues](troubleshoot-onboarding.md).
|
||||
|
||||

|
||||
|
||||
|
@ -140,8 +140,8 @@ You can onboard Windows Server (SAC) version 1803, Windows Server 2019, or Windo
|
||||
|
||||
- [Local script](configure-endpoints-script.md)
|
||||
- [Group Policy](configure-endpoints-gp.md)
|
||||
- [Microsoft Endpoint Configuration Manager](configure-endpoints-sccm.md#onboard-windows-10-devices-using-microsoft-endpoint-configuration-manager-current-branch)
|
||||
- [System Center Configuration Manager 2012 / 2012 R2 1511 / 1602](configure-endpoints-sccm.md#onboard-windows-10-devices-using-earlier-versions-of-system-center-configuration-manager)
|
||||
- [Microsoft Endpoint Configuration Manager](configure-endpoints-sccm.md)
|
||||
- [System Center Configuration Manager 2012 / 2012 R2 1511 / 1602](configure-endpoints-sccm.md#onboard-devices-using-system-center-configuration-manager)
|
||||
- [VDI onboarding scripts for non-persistent devices](configure-endpoints-vdi.md)
|
||||
|
||||
> [!NOTE]
|
||||
|
Binary file not shown.
After Width: | Height: | Size: 120 KiB |
Loading…
x
Reference in New Issue
Block a user