mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 21:33:38 +00:00
Merged PR 6015: Merge atp-server-support to atp-rs4
This commit is contained in:
@ -18,6 +18,7 @@ ms.date: 03/05/2018
|
|||||||
|
|
||||||
- Windows Server 2012 R2
|
- Windows Server 2012 R2
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
- Windows Server version 1803
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
[!include[Prerelease information](prerelease.md)]
|
[!include[Prerelease information](prerelease.md)]
|
||||||
@ -30,7 +31,7 @@ Windows Defender ATP supports the onboarding of the following servers:
|
|||||||
- Windows Server 2012 R2
|
- Windows Server 2012 R2
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
|
||||||
## Onboard server endpoints
|
## Onboard Windows Server 2012 R2 and Windows Server 2016
|
||||||
|
|
||||||
To onboard your servers to Windows Defender ATP, you’ll need to:
|
To onboard your servers to Windows Defender ATP, you’ll need to:
|
||||||
|
|
||||||
@ -79,6 +80,30 @@ Once completed, you should see onboarded servers in the portal within an hour.
|
|||||||
| winatp-gw-neu.microsoft.com | 443 |
|
| winatp-gw-neu.microsoft.com | 443 |
|
||||||
| winatp-gw-weu.microsoft.com | 443 |
|
| winatp-gw-weu.microsoft.com | 443 |
|
||||||
|
|
||||||
|
## Onboard Windows Server, version 1803 [NEED TO CHECK FINAL PRODUCT NAME FOR THIS SERVER]
|
||||||
|
You’ll be able to onboard in the same method available for Windows 10 client endpoints. For more information, see [Configure client endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md). Support for Windows Server, version 1803 provides deeper insight into activities happening on the server, coverage for kernel and memory attack, and enables response actions on Windows Server endpoint as well.
|
||||||
|
|
||||||
|
1. Install the latest Windows Server Insider build on an endpoint. For more information, see [Windows Server Insider Preview](https://www.microsoft.com/en-us/software-download/windowsinsiderpreviewserver).
|
||||||
|
|
||||||
|
2. Configure Windows Defender ATP onboarding settings on the Server endpoint. For more information, see [Windows Defender ATP client onboarding](configure-endpoints-windows-defender-advanced-threat-protection.md).
|
||||||
|
|
||||||
|
3. If you’re running a third party antimalware solution, you'll need to apply the following Windows Defender AV passive mode settings and verify it was configured correctly:
|
||||||
|
|
||||||
|
a. Set the following registry entry:
|
||||||
|
- Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`
|
||||||
|
- Name: ForceDefenderPassiveMode
|
||||||
|
- Value: 1
|
||||||
|
|
||||||
|
b. Run the following PowerShell command to verify that the passive mode was configured:
|
||||||
|
```Get-WinEvent -FilterHashtable @{ProviderName="Microsoft-Windows-Sense" ;ID=84}```
|
||||||
|
|
||||||
|
c. Confirm that a recent event containing the passive mode event is found:
|
||||||
|

|
||||||
|
|
||||||
|
4. Run the following command to check if Windows Defender AV is installed:
|
||||||
|
```sc query Windefend```
|
||||||
|
|
||||||
|
If the result is ‘The specified service does not exist as an installed service’, then you'll need to install Windows Defender AV. For more information, see [Windows Defender Antivirus in Windows 10](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10).
|
||||||
|
|
||||||
### Offboard server endpoints
|
### Offboard server endpoints
|
||||||
To offboard the server, you can uninstall the MMA agent from the server or detach it from reporting to your Windows Defender ATP workspace. After offboarding the agent, the server will no longer send sensor data to Windows Defender ATP.
|
To offboard the server, you can uninstall the MMA agent from the server or detach it from reporting to your Windows Defender ATP workspace. After offboarding the agent, the server will no longer send sensor data to Windows Defender ATP.
|
||||||
|
Binary file not shown.
After Width: | Height: | Size: 33 KiB |
@ -128,6 +128,8 @@ You must configure the signature updates on the Windows Defender ATP endpoints w
|
|||||||
|
|
||||||
When Windows Defender Antivirus is not the active antimalware in your organization and you use the Windows Defender ATP service, Windows Defender Antivirus goes on passive mode. If your organization has disabled Windows Defender Antivirus through group policy or other methods, machines that are onboarded to Windows Defender ATP must be excluded from this group policy.
|
When Windows Defender Antivirus is not the active antimalware in your organization and you use the Windows Defender ATP service, Windows Defender Antivirus goes on passive mode. If your organization has disabled Windows Defender Antivirus through group policy or other methods, machines that are onboarded to Windows Defender ATP must be excluded from this group policy.
|
||||||
|
|
||||||
|
Depending on the server version you're onboarding, you might need to configure a Group Policy setting to run on passive mode. For more information, see [Configure server endpoints](configure-server-endpoints-windows-defender-advanced-threat-protection.md).
|
||||||
|
|
||||||
For more information, see [Windows Defender Antivirus compatibility](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md).
|
For more information, see [Windows Defender Antivirus compatibility](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md).
|
||||||
|
|
||||||
## Windows Defender Antivirus Early Launch Antimalware (ELAM) driver is enabled
|
## Windows Defender Antivirus Early Launch Antimalware (ELAM) driver is enabled
|
||||||
|
@ -47,6 +47,9 @@ You must configure the signature updates on the Windows Defender ATP endpoints w
|
|||||||
|
|
||||||
When Windows Defender Antivirus is not the active antimalware in your organization and you use the Windows Defender ATP service, Windows Defender Antivirus goes on passive mode. If your organization has disabled Windows Defender Antivirus through group policy or other methods, machines that are onboarded to Windows Defender ATP must be excluded from this group policy.
|
When Windows Defender Antivirus is not the active antimalware in your organization and you use the Windows Defender ATP service, Windows Defender Antivirus goes on passive mode. If your organization has disabled Windows Defender Antivirus through group policy or other methods, machines that are onboarded to Windows Defender ATP must be excluded from this group policy.
|
||||||
|
|
||||||
|
If you are onboarding servers and Windows Defender Antivirus is not the active antimalware on your servers, you shouldn't uninstall Windows Defender Antivirus. You'll need to configure it to run on passive mode. For more information, see [Configure server endpoints](configure-server-endpoints-windows-defender-advanced-threat-protection.md).
|
||||||
|
|
||||||
|
|
||||||
For more information, see [Windows Defender Antivirus compatibility](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md).
|
For more information, see [Windows Defender Antivirus compatibility](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md).
|
||||||
|
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user