icons on each page

This commit is contained in:
Joey Caparas 2020-02-13 17:45:02 -08:00
parent 9eedf1ca41
commit 3aee2cad9e
5 changed files with 311 additions and 184 deletions

View File

@ -27,189 +27,188 @@
#### [Phase 3: Configure](microsoft-defender-atp/configure.md) #### [Phase 3: Configure](microsoft-defender-atp/configure.md)
### [Configuration guide]()
#### [Configure and manage capabilities]()
##### [Configure attack surface reduction]() ### [Manage capabilities]()
###### [Attack surface reduction configuration settings](microsoft-defender-atp/configure-attack-surface-reduction.md)
##### [Hardware-based isolation]() #### [Configure attack surface reduction]()
###### [System isolation](windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md) ##### [Attack surface reduction configuration settings](microsoft-defender-atp/configure-attack-surface-reduction.md)
###### [Application isolation]() #### [Hardware-based isolation]()
####### [Install Windows Defender Application Guard](windows-defender-application-guard/install-wd-app-guard.md) ##### [System isolation](windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md)
####### [Application control](windows-defender-application-control/windows-defender-application-control.md)
###### [Device control]() ##### [Application isolation]()
####### [Control USB devices](device-control/control-usb-devices-using-intune.md) ###### [Install Windows Defender Application Guard](windows-defender-application-guard/install-wd-app-guard.md)
###### [Application control](windows-defender-application-control/windows-defender-application-control.md)
####### [Device Guard]() ##### [Device control]()
######## [Code integrity](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md) ###### [Control USB devices](device-control/control-usb-devices-using-intune.md)
######## [Memory integrity]() ###### [Device Guard]()
######### [Understand memory integrity](device-guard/memory-integrity.md) ####### [Code integrity](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md)
######### [Hardware qualifications](device-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md)
######### [Enable HVCI](device-guard/enable-virtualization-based-protection-of-code-integrity.md)
###### [Exploit protection]() ####### [Memory integrity]()
####### [Enable exploit protection](microsoft-defender-atp/enable-exploit-protection.md) ######## [Understand memory integrity](device-guard/memory-integrity.md)
####### [Import/export configurations](microsoft-defender-atp/import-export-exploit-protection-emet-xml.md) ######## [Hardware qualifications](device-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md)
######## [Enable HVCI](device-guard/enable-virtualization-based-protection-of-code-integrity.md)
###### [Network protection](microsoft-defender-atp/enable-network-protection.md) ##### [Exploit protection]()
###### [Controlled folder access](microsoft-defender-atp/enable-controlled-folders.md) ###### [Enable exploit protection](microsoft-defender-atp/enable-exploit-protection.md)
###### [Import/export configurations](microsoft-defender-atp/import-export-exploit-protection-emet-xml.md)
###### [Attack surface reduction controls]() ##### [Network protection](microsoft-defender-atp/enable-network-protection.md)
####### [Enable attack surface reduction rules](microsoft-defender-atp/enable-attack-surface-reduction.md) ##### [Controlled folder access](microsoft-defender-atp/enable-controlled-folders.md)
####### [Customize attack surface reduction](microsoft-defender-atp/customize-attack-surface-reduction.md)
###### [Network firewall](windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md) ##### [Attack surface reduction controls]()
###### [Enable attack surface reduction rules](microsoft-defender-atp/enable-attack-surface-reduction.md)
###### [Customize attack surface reduction](microsoft-defender-atp/customize-attack-surface-reduction.md)
##### [Configure next-generation protection]() ##### [Network firewall](windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md)
###### [Configure Windows Defender Antivirus features](windows-defender-antivirus/configure-windows-defender-antivirus-features.md)
###### [Utilize Microsoft cloud-delivered protection](windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md) #### [Configure next-generation protection]()
####### [Enable cloud-delivered protection](windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md) ##### [Configure Windows Defender Antivirus features](windows-defender-antivirus/configure-windows-defender-antivirus-features.md)
####### [Specify the cloud-delivered protection level](windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md)
####### [Configure and validate network connections](windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md)
####### [Prevent security settings changes with tamper protection](windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md)
####### [Enable Block at first sight](windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md)
####### [Configure the cloud block timeout period](windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md)
###### [Configure behavioral, heuristic, and real-time protection]() ##### [Utilize Microsoft cloud-delivered protection](windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md)
####### [Configuration overview](windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md) ###### [Enable cloud-delivered protection](windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md)
####### [Detect and block Potentially Unwanted Applications](windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md) ###### [Specify the cloud-delivered protection level](windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md)
####### [Enable and configure always-on protection and monitoring](windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md) ###### [Configure and validate network connections](windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md)
###### [Prevent security settings changes with tamper protection](windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md)
###### [Enable Block at first sight](windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md)
###### [Configure the cloud block timeout period](windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md)
###### [Antivirus on Windows Server 2016](windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md) ##### [Configure behavioral, heuristic, and real-time protection]()
###### [Configuration overview](windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md)
###### [Detect and block Potentially Unwanted Applications](windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md)
###### [Enable and configure always-on protection and monitoring](windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md)
###### [Antivirus compatibility]() ##### [Antivirus on Windows Server 2016](windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md)
####### [Compatibility charts](windows-defender-antivirus/windows-defender-antivirus-compatibility.md)
####### [Use limited periodic antivirus scanning](windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md)
###### [Deploy, manage updates, and report on antivirus]() ##### [Antivirus compatibility]()
####### [Preparing to deploy](windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md) ###### [Compatibility charts](windows-defender-antivirus/windows-defender-antivirus-compatibility.md)
####### [Deploy and enable antivirus](windows-defender-antivirus/deploy-windows-defender-antivirus.md) ###### [Use limited periodic antivirus scanning](windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md)
######## [Deployment guide for VDI environments](windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md)
####### [Report on antivirus protection]() ##### [Deploy, manage updates, and report on antivirus]()
######## [Review protection status and alerts](windows-defender-antivirus/report-monitor-windows-defender-antivirus.md) ###### [Preparing to deploy](windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md)
######## [Troubleshoot antivirus reporting in Update Compliance](windows-defender-antivirus/troubleshoot-reporting.md) ###### [Deploy and enable antivirus](windows-defender-antivirus/deploy-windows-defender-antivirus.md)
####### [Deployment guide for VDI environments](windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md)
####### [Manage updates and apply baselines]() ###### [Report on antivirus protection]()
######## [Learn about the different kinds of updates](windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md) ####### [Review protection status and alerts](windows-defender-antivirus/report-monitor-windows-defender-antivirus.md)
######## [Manage protection and security intelligence updates](windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md) ####### [Troubleshoot antivirus reporting in Update Compliance](windows-defender-antivirus/troubleshoot-reporting.md)
######## [Manage when protection updates should be downloaded and applied](windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md)
######## [Manage updates for endpoints that are out of date](windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md)
######## [Manage event-based forced updates](windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md)
######## [Manage updates for mobile devices and VMs](windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md)
###### [Customize, initiate, and review the results of scans and remediation]() ###### [Manage updates and apply baselines]()
####### [Configuration overview](windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md) ####### [Learn about the different kinds of updates](windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md)
####### [Manage protection and security intelligence updates](windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md)
####### [Manage when protection updates should be downloaded and applied](windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md)
####### [Manage updates for endpoints that are out of date](windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md)
####### [Manage event-based forced updates](windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md)
####### [Manage updates for mobile devices and VMs](windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md)
####### [Configure and validate exclusions in antivirus scans]() ##### [Customize, initiate, and review the results of scans and remediation]()
######## [Exclusions overview](windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md) ###### [Configuration overview](windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md)
######## [Configure and validate exclusions based on file name, extension, and folder location](windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md)
######## [Configure and validate exclusions for files opened by processes](windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md)
######## [Configure antivirus exclusions Windows Server 2016](windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md)
####### [Configure scanning antivirus options](windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md) ###### [Configure and validate exclusions in antivirus scans]()
####### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md) ####### [Exclusions overview](windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md)
####### [Configure scheduled scans](windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md) ####### [Configure and validate exclusions based on file name, extension, and folder location](windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md)
####### [Configure and run scans](windows-defender-antivirus/run-scan-windows-defender-antivirus.md) ####### [Configure and validate exclusions for files opened by processes](windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md)
####### [Review scan results](windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md) ####### [Configure antivirus exclusions Windows Server 2016](windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md)
####### [Run and review the results of an offline scan](windows-defender-antivirus/windows-defender-offline.md)
###### [Configure scanning antivirus options](windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md)
###### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md)
###### [Configure scheduled scans](windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md)
###### [Configure and run scans](windows-defender-antivirus/run-scan-windows-defender-antivirus.md)
###### [Review scan results](windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md)
###### [Run and review the results of an offline scan](windows-defender-antivirus/windows-defender-offline.md)
##### [Restore quarantined files](windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md)
##### [Manage antivirus in your business]()
###### [Management overview](windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md)
###### [Use Group Policy settings to configure and manage antivirus](windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md)
###### [Use Microsoft Endpoint Configuration Manager and Microsoft Intune to configure and manage antivirus](windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md)
###### [Use PowerShell cmdlets to configure and manage antivirus](windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md)
###### [Use Windows Management Instrumentation (WMI) to configure and manage antivirus](windows-defender-antivirus/use-wmi-windows-defender-antivirus.md)
###### [Use the mpcmdrun.exe commandline tool to configure and manage antivirus](windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md)
##### [Manage scans and remediation]()
###### [Management overview](windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md)
###### [Configure and validate exclusions in antivirus scans]()
####### [Exclusions overview](windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md)
####### [Configure and validate exclusions based on file name, extension, and folder location](windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md)
####### [Configure and validate exclusions for files opened by processes](windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md)
####### [Configure antivirus exclusions on Windows Server 2016](windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md)
###### [Configure scanning options](windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md)
##### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md)
###### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md)
###### [Configure scheduled scans](windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md)
###### [Configure and run scans](windows-defender-antivirus/run-scan-windows-defender-antivirus.md)
###### [Review scan results](windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md)
###### [Run and review the results of an offline scan](windows-defender-antivirus/windows-defender-offline.md)
###### [Restore quarantined files](windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md) ###### [Restore quarantined files](windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md)
###### [Manage antivirus in your business]() ##### [Manage next-generation protection in your business]()
####### [Management overview](windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md) ###### [Handle false positives/negatives in Windows Defender Antivirus](windows-defender-antivirus/antivirus-false-positives-negatives.md)
####### [Use Group Policy settings to configure and manage antivirus](windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md) ###### [Management overview](windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md)
####### [Use Microsoft Endpoint Configuration Manager and Microsoft Intune to configure and manage antivirus](windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md) ###### [Use Microsoft Intune and Microsoft Endpoint Configuration Manager to manage next generation protection](windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md)
####### [Use PowerShell cmdlets to configure and manage antivirus](windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md) ###### [Use Group Policy settings to manage next generation protection](windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md)
####### [Use Windows Management Instrumentation (WMI) to configure and manage antivirus](windows-defender-antivirus/use-wmi-windows-defender-antivirus.md) ###### [Use PowerShell cmdlets to manage next generation protection](windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md)
####### [Use the mpcmdrun.exe commandline tool to configure and manage antivirus](windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md) ###### [Use Windows Management Instrumentation (WMI) to manage next generation protection](windows-defender-antivirus/use-wmi-windows-defender-antivirus.md)
###### [Use the mpcmdrun.exe command line tool to manage next generation protection](windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md)
###### [Manage scans and remediation]() #### [Microsoft Defender Advanced Threat Protection for Mac](microsoft-defender-atp/microsoft-defender-atp-mac.md)
####### [Management overview](windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md) ##### [What's New](microsoft-defender-atp/mac-whatsnew.md)
##### [Deploy]()
###### [Microsoft Intune-based deployment](microsoft-defender-atp/mac-install-with-intune.md)
###### [JAMF-based deployment](microsoft-defender-atp/mac-install-with-jamf.md)
###### [Deployment with a different Mobile Device Management (MDM) system](microsoft-defender-atp/mac-install-with-other-mdm.md)
###### [Manual deployment](microsoft-defender-atp/mac-install-manually.md)
##### [Update](microsoft-defender-atp/mac-updates.md)
##### [Configure]()
###### [Configure and validate exclusions](microsoft-defender-atp/mac-exclusions.md)
###### [Set preferences](microsoft-defender-atp/mac-preferences.md)
###### [Detect and block Potentially Unwanted Applications](microsoft-defender-atp/mac-pua.md)
##### [Troubleshoot]()
###### [Troubleshoot performance issues](microsoft-defender-atp/mac-support-perf.md)
###### [Troubleshoot kernel extension issues](microsoft-defender-atp/mac-support-kext.md)
##### [Privacy](microsoft-defender-atp/mac-privacy.md)
##### [Resources](microsoft-defender-atp/mac-resources.md)
####### [Configure and validate exclusions in antivirus scans]() #### [Configure Secure score dashboard security controls](microsoft-defender-atp/secure-score-dashboard.md)
######## [Exclusions overview](windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md)
######## [Configure and validate exclusions based on file name, extension, and folder location](windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md)
######## [Configure and validate exclusions for files opened by processes](windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md)
######## [Configure antivirus exclusions on Windows Server 2016](windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md)
####### [Configure scanning options](windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md) #### [Configure and manage Microsoft Threat Experts capabilities](microsoft-defender-atp/configure-microsoft-threat-experts.md)
###### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md) ### [Configure portal settings]()
####### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md) #### [Set up preferences](microsoft-defender-atp/preferences-setup.md)
####### [Configure scheduled scans](windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md) #### [General]()
####### [Configure and run scans](windows-defender-antivirus/run-scan-windows-defender-antivirus.md) ##### [Update data retention settings](microsoft-defender-atp/data-retention-settings.md)
####### [Review scan results](windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md) ##### [Configure alert notifications](microsoft-defender-atp/configure-email-notifications.md)
####### [Run and review the results of an offline scan](windows-defender-antivirus/windows-defender-offline.md) ##### [Enable and create Power BI reports using Windows Defender Security center data](microsoft-defender-atp/powerbi-reports.md)
####### [Restore quarantined files](windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md) ##### [Enable Secure score security controls](microsoft-defender-atp/enable-secure-score.md)
##### [Configure advanced features](microsoft-defender-atp/advanced-features.md)
###### [Manage next-generation protection in your business]() #### [Permissions]()
####### [Handle false positives/negatives in Windows Defender Antivirus](windows-defender-antivirus/antivirus-false-positives-negatives.md) ##### [Use basic permissions to access the portal](microsoft-defender-atp/basic-permissions.md)
####### [Management overview](windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md) ##### [Manage portal access using RBAC](microsoft-defender-atp/rbac.md)
####### [Use Microsoft Intune and Microsoft Endpoint Configuration Manager to manage next generation protection](windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md) ###### [Create and manage roles](microsoft-defender-atp/user-roles.md)
####### [Use Group Policy settings to manage next generation protection](windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md) ###### [Create and manage machine groups](microsoft-defender-atp/machine-groups.md)
####### [Use PowerShell cmdlets to manage next generation protection](windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md) ####### [Create and manage machine tags](microsoft-defender-atp/machine-tags.md)
####### [Use Windows Management Instrumentation (WMI) to manage next generation protection](windows-defender-antivirus/use-wmi-windows-defender-antivirus.md)
####### [Use the mpcmdrun.exe command line tool to manage next generation protection](windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md)
##### [Microsoft Defender Advanced Threat Protection for Mac](microsoft-defender-atp/microsoft-defender-atp-mac.md) #### [APIs]()
###### [What's New](microsoft-defender-atp/mac-whatsnew.md) ##### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration.md)
###### [Deploy]()
####### [Microsoft Intune-based deployment](microsoft-defender-atp/mac-install-with-intune.md)
####### [JAMF-based deployment](microsoft-defender-atp/mac-install-with-jamf.md)
####### [Deployment with a different Mobile Device Management (MDM) system](microsoft-defender-atp/mac-install-with-other-mdm.md)
####### [Manual deployment](microsoft-defender-atp/mac-install-manually.md)
###### [Update](microsoft-defender-atp/mac-updates.md)
###### [Configure]()
####### [Configure and validate exclusions](microsoft-defender-atp/mac-exclusions.md)
####### [Set preferences](microsoft-defender-atp/mac-preferences.md)
####### [Detect and block Potentially Unwanted Applications](microsoft-defender-atp/mac-pua.md)
###### [Troubleshoot]()
####### [Troubleshoot performance issues](microsoft-defender-atp/mac-support-perf.md)
####### [Troubleshoot kernel extension issues](microsoft-defender-atp/mac-support-kext.md)
###### [Privacy](microsoft-defender-atp/mac-privacy.md)
###### [Resources](microsoft-defender-atp/mac-resources.md)
##### [Configure Secure score dashboard security controls](microsoft-defender-atp/secure-score-dashboard.md) #### [Rules]()
##### [Manage suppression rules](microsoft-defender-atp/manage-suppression-rules.md)
##### [Manage indicators](microsoft-defender-atp/manage-indicators.md)
##### [Manage automation file uploads](microsoft-defender-atp/manage-automation-file-uploads.md)
##### [Manage automation folder exclusions](microsoft-defender-atp/manage-automation-folder-exclusions.md)
##### [Configure and manage Microsoft Threat Experts capabilities](microsoft-defender-atp/configure-microsoft-threat-experts.md) #### [Machine management]()
##### [Onboarding machines](microsoft-defender-atp/onboard-configure.md)
##### [Offboarding machines](microsoft-defender-atp/offboard-machines.md)
#### [Configure portal settings]() #### [Configure Microsoft Defender Security Center time zone settings](microsoft-defender-atp/time-settings.md)
##### [Set up preferences](microsoft-defender-atp/preferences-setup.md)
##### [General]()
###### [Update data retention settings](microsoft-defender-atp/data-retention-settings.md)
###### [Configure alert notifications](microsoft-defender-atp/configure-email-notifications.md)
###### [Enable and create Power BI reports using Windows Defender Security center data](microsoft-defender-atp/powerbi-reports.md)
###### [Enable Secure score security controls](microsoft-defender-atp/enable-secure-score.md)
###### [Configure advanced features](microsoft-defender-atp/advanced-features.md)
##### [Permissions]()
###### [Use basic permissions to access the portal](microsoft-defender-atp/basic-permissions.md)
###### [Manage portal access using RBAC](microsoft-defender-atp/rbac.md)
####### [Create and manage roles](microsoft-defender-atp/user-roles.md)
####### [Create and manage machine groups](microsoft-defender-atp/machine-groups.md)
######## [Create and manage machine tags](microsoft-defender-atp/machine-tags.md)
##### [APIs]()
###### [Enable Threat intel (Deprecated)](microsoft-defender-atp/enable-custom-ti.md)
###### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration.md)
##### [Rules]()
###### [Manage suppression rules](microsoft-defender-atp/manage-suppression-rules.md)
###### [Manage indicators](microsoft-defender-atp/manage-indicators.md)
###### [Manage automation file uploads](microsoft-defender-atp/manage-automation-file-uploads.md)
###### [Manage automation folder exclusions](microsoft-defender-atp/manage-automation-folder-exclusions.md)
##### [Machine management]()
###### [Onboarding machines](microsoft-defender-atp/onboard-configure.md)
###### [Offboarding machines](microsoft-defender-atp/offboard-machines.md)
##### [Configure Microsoft Defender Security Center time zone settings](microsoft-defender-atp/time-settings.md)

View File

@ -17,3 +17,42 @@ ms.topic: article
--- ---
# Configure capabilities # Configure capabilities
Deploying Microsoft Defender ATP is a three-phase process:
<br>
<table border="0" width="100%" align="center">
<tr style="text-align:center;">
<td align="center" style="width:25%; border:0;">
<a href= "windows/security/threat-protection/microsoft-defender-atp/prepare-deployment">
<img src="images/plan.png" alt="Plan to deploy Microsoft Defender ATP" title="Plan" />
<br/>Plan </a><br>
</td>
<td align="center">
<a href="windows/security/threat-protection/microsoft-defender-atp/production-deployment">
<img src="images/oboard.png" alt="Onboard to the Microsoft Defender ATP service" title="Onboard to Microsoft Defender ATP" />
<br/>Onboard </a><br>
</td>
<td align="center">
<a href="windows/security/threat-protection/microsoft-defender-atp/configure">
<img src="images/configure.png" alt="Configure capabilities" title="Configure capabilities" />
<br/>Configure </a><br>
</td>
</tr>
<tr>
<td style="width:25%; border:0;">
</td>
<td valign="top" style="width:25%; border:0;">
</td>
<td valign="top" style="width:25%; border:0;">
</td>
</tr>
</table>
You are currently in the configuration phase.
![Icons](images/configure-page.png)

View File

@ -42,9 +42,8 @@ There are three phases in deploying Microsoft Defender ATP:
</tr> </tr>
<tr> <tr>
<td style="width:25%; border:0;"> <td style="width:25%; border:0;">
The planning phase guides you through what you need to consider when deploying Microsoft Defender ATP. The planning phase guides you through what you need to consider when deploying Microsoft Defender ATP:
You will need to consider the following:
- Stakeholders and Sign-off - Stakeholders and Sign-off
- Environment considerations - Environment considerations
- Access - Access
@ -66,4 +65,6 @@ Maximize the Microsoft Defender ATP capabilities by configuring the components t
</tr> </tr>
</table> </table>
The deployment guide will walk you through the recommended path in deploying Microsoft Defender ATP.

View File

@ -17,11 +17,58 @@ ms.collection: M365-security-compliance
ms.topic: article ms.topic: article
--- ---
# Prepare Microsoft Defender ATP deployment # Plan Microsoft Defender ATP deployment
**Applies to:** **Applies to:**
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
Deploying Microsoft Defender ATP is a three-phase process:
<br>
<table border="0" width="100%" align="center">
<tr style="text-align:center;">
<td align="center" style="width:25%; border:0;">
<a href= "windows/security/threat-protection/microsoft-defender-atp/prepare-deployment">
<img src="images/plan.png" alt="Plan to deploy Microsoft Defender ATP" title="Plan" />
<br/>Plan </a><br>
</td>
<td align="center">
<a href="windows/security/threat-protection/microsoft-defender-atp/production-deployment">
<img src="images/oboard.png" alt="Onboard to the Microsoft Defender ATP service" title="Onboard to Microsoft Defender ATP" />
<br/>Onboard </a><br>
</td>
<td align="center">
<a href="windows/security/threat-protection/microsoft-defender-atp/configure">
<img src="images/configure.png" alt="Configure capabilities" title="Configure capabilities" />
<br/>Configure </a><br>
</td>
</tr>
<tr>
<td style="width:25%; border:0;">
</td>
<td valign="top" style="width:25%; border:0;">
</td>
<td valign="top" style="width:25%; border:0;">
</td>
</tr>
</table>
You are currently in the planning phase.
![Icons](images/plan-page.png)
## Stakeholders and Sign-off ## Stakeholders and Sign-off
The following section serves to identify all the stakeholders that are involved The following section serves to identify all the stakeholders that are involved
in this project and need to sign-off, review, or stay informed. Add stakeholders in this project and need to sign-off, review, or stay informed. Add stakeholders

View File

@ -22,6 +22,47 @@ ms.topic: article
**Applies to:** **Applies to:**
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
Deploying Microsoft Defender ATP is a three-phase process:
<br>
<table border="0" width="100%" align="center">
<tr style="text-align:center;">
<td align="center" style="width:25%; border:0;">
<a href= "windows/security/threat-protection/microsoft-defender-atp/prepare-deployment">
<img src="images/plan.png" alt="Plan to deploy Microsoft Defender ATP" title="Plan" />
<br/>Plan </a><br>
</td>
<td align="center">
<a href="windows/security/threat-protection/microsoft-defender-atp/production-deployment">
<img src="images/oboard.png" alt="Onboard to the Microsoft Defender ATP service" title="Onboard to Microsoft Defender ATP" />
<br/>Onboard </a><br>
</td>
<td align="center">
<a href="windows/security/threat-protection/microsoft-defender-atp/configure">
<img src="images/configure.png" alt="Configure capabilities" title="Configure capabilities" />
<br/>Configure </a><br>
</td>
</tr>
<tr>
<td style="width:25%; border:0;">
</td>
<td valign="top" style="width:25%; border:0;">
</td>
<td valign="top" style="width:25%; border:0;">
</td>
</tr>
</table>
You are currently in the onboard phase
![Icons](images/onboard-page.png)
Proper planning is the foundation of a successful deployment. In this deployment scenario, you'll be guided through the steps on: Proper planning is the foundation of a successful deployment. In this deployment scenario, you'll be guided through the steps on:
- Tenant configuration - Tenant configuration
- Network configuration - Network configuration