icons on each page

This commit is contained in:
Joey Caparas 2020-02-13 17:45:02 -08:00
parent 9eedf1ca41
commit 3aee2cad9e
5 changed files with 311 additions and 184 deletions

View File

@ -27,189 +27,188 @@
#### [Phase 3: Configure](microsoft-defender-atp/configure.md) #### [Phase 3: Configure](microsoft-defender-atp/configure.md)
### [Configuration guide]()
#### [Configure and manage capabilities]()
##### [Configure attack surface reduction]()
###### [Attack surface reduction configuration settings](microsoft-defender-atp/configure-attack-surface-reduction.md)
##### [Hardware-based isolation]()
###### [System isolation](windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md)
###### [Application isolation]()
####### [Install Windows Defender Application Guard](windows-defender-application-guard/install-wd-app-guard.md)
####### [Application control](windows-defender-application-control/windows-defender-application-control.md)
###### [Device control]()
####### [Control USB devices](device-control/control-usb-devices-using-intune.md)
####### [Device Guard]()
######## [Code integrity](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md)
######## [Memory integrity]()
######### [Understand memory integrity](device-guard/memory-integrity.md)
######### [Hardware qualifications](device-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md)
######### [Enable HVCI](device-guard/enable-virtualization-based-protection-of-code-integrity.md)
###### [Exploit protection]()
####### [Enable exploit protection](microsoft-defender-atp/enable-exploit-protection.md)
####### [Import/export configurations](microsoft-defender-atp/import-export-exploit-protection-emet-xml.md)
###### [Network protection](microsoft-defender-atp/enable-network-protection.md) ### [Manage capabilities]()
###### [Controlled folder access](microsoft-defender-atp/enable-controlled-folders.md)
#### [Configure attack surface reduction]()
###### [Attack surface reduction controls]() ##### [Attack surface reduction configuration settings](microsoft-defender-atp/configure-attack-surface-reduction.md)
####### [Enable attack surface reduction rules](microsoft-defender-atp/enable-attack-surface-reduction.md)
####### [Customize attack surface reduction](microsoft-defender-atp/customize-attack-surface-reduction.md) #### [Hardware-based isolation]()
##### [System isolation](windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md)
###### [Network firewall](windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md)
##### [Application isolation]()
##### [Configure next-generation protection]() ###### [Install Windows Defender Application Guard](windows-defender-application-guard/install-wd-app-guard.md)
###### [Configure Windows Defender Antivirus features](windows-defender-antivirus/configure-windows-defender-antivirus-features.md) ###### [Application control](windows-defender-application-control/windows-defender-application-control.md)
###### [Utilize Microsoft cloud-delivered protection](windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md) ##### [Device control]()
####### [Enable cloud-delivered protection](windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md) ###### [Control USB devices](device-control/control-usb-devices-using-intune.md)
####### [Specify the cloud-delivered protection level](windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md)
####### [Configure and validate network connections](windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md) ###### [Device Guard]()
####### [Prevent security settings changes with tamper protection](windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md) ####### [Code integrity](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md)
####### [Enable Block at first sight](windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md)
####### [Configure the cloud block timeout period](windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md) ####### [Memory integrity]()
######## [Understand memory integrity](device-guard/memory-integrity.md)
###### [Configure behavioral, heuristic, and real-time protection]() ######## [Hardware qualifications](device-guard/requirements-and-deployment-planning-guidelines-for-virtualization-based-protection-of-code-integrity.md)
####### [Configuration overview](windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md) ######## [Enable HVCI](device-guard/enable-virtualization-based-protection-of-code-integrity.md)
####### [Detect and block Potentially Unwanted Applications](windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md)
####### [Enable and configure always-on protection and monitoring](windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md) ##### [Exploit protection]()
###### [Enable exploit protection](microsoft-defender-atp/enable-exploit-protection.md)
###### [Antivirus on Windows Server 2016](windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md) ###### [Import/export configurations](microsoft-defender-atp/import-export-exploit-protection-emet-xml.md)
###### [Antivirus compatibility]() ##### [Network protection](microsoft-defender-atp/enable-network-protection.md)
####### [Compatibility charts](windows-defender-antivirus/windows-defender-antivirus-compatibility.md) ##### [Controlled folder access](microsoft-defender-atp/enable-controlled-folders.md)
####### [Use limited periodic antivirus scanning](windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md)
##### [Attack surface reduction controls]()
###### [Deploy, manage updates, and report on antivirus]() ###### [Enable attack surface reduction rules](microsoft-defender-atp/enable-attack-surface-reduction.md)
####### [Preparing to deploy](windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md) ###### [Customize attack surface reduction](microsoft-defender-atp/customize-attack-surface-reduction.md)
####### [Deploy and enable antivirus](windows-defender-antivirus/deploy-windows-defender-antivirus.md)
######## [Deployment guide for VDI environments](windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md) ##### [Network firewall](windows-firewall/windows-firewall-with-advanced-security-deployment-guide.md)
####### [Report on antivirus protection]() #### [Configure next-generation protection]()
######## [Review protection status and alerts](windows-defender-antivirus/report-monitor-windows-defender-antivirus.md) ##### [Configure Windows Defender Antivirus features](windows-defender-antivirus/configure-windows-defender-antivirus-features.md)
######## [Troubleshoot antivirus reporting in Update Compliance](windows-defender-antivirus/troubleshoot-reporting.md)
##### [Utilize Microsoft cloud-delivered protection](windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md)
####### [Manage updates and apply baselines]() ###### [Enable cloud-delivered protection](windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md)
######## [Learn about the different kinds of updates](windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md) ###### [Specify the cloud-delivered protection level](windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md)
######## [Manage protection and security intelligence updates](windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md) ###### [Configure and validate network connections](windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md)
######## [Manage when protection updates should be downloaded and applied](windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md) ###### [Prevent security settings changes with tamper protection](windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md)
######## [Manage updates for endpoints that are out of date](windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md) ###### [Enable Block at first sight](windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md)
######## [Manage event-based forced updates](windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md) ###### [Configure the cloud block timeout period](windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md)
######## [Manage updates for mobile devices and VMs](windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md)
##### [Configure behavioral, heuristic, and real-time protection]()
###### [Customize, initiate, and review the results of scans and remediation]() ###### [Configuration overview](windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md)
####### [Configuration overview](windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md) ###### [Detect and block Potentially Unwanted Applications](windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md)
###### [Enable and configure always-on protection and monitoring](windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md)
####### [Configure and validate exclusions in antivirus scans]()
######## [Exclusions overview](windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md) ##### [Antivirus on Windows Server 2016](windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md)
######## [Configure and validate exclusions based on file name, extension, and folder location](windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md)
######## [Configure and validate exclusions for files opened by processes](windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md) ##### [Antivirus compatibility]()
######## [Configure antivirus exclusions Windows Server 2016](windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md) ###### [Compatibility charts](windows-defender-antivirus/windows-defender-antivirus-compatibility.md)
###### [Use limited periodic antivirus scanning](windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md)
####### [Configure scanning antivirus options](windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md)
####### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md) ##### [Deploy, manage updates, and report on antivirus]()
####### [Configure scheduled scans](windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md) ###### [Preparing to deploy](windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md)
####### [Configure and run scans](windows-defender-antivirus/run-scan-windows-defender-antivirus.md) ###### [Deploy and enable antivirus](windows-defender-antivirus/deploy-windows-defender-antivirus.md)
####### [Review scan results](windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md) ####### [Deployment guide for VDI environments](windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md)
####### [Run and review the results of an offline scan](windows-defender-antivirus/windows-defender-offline.md)
###### [Report on antivirus protection]()
###### [Restore quarantined files](windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md) ####### [Review protection status and alerts](windows-defender-antivirus/report-monitor-windows-defender-antivirus.md)
####### [Troubleshoot antivirus reporting in Update Compliance](windows-defender-antivirus/troubleshoot-reporting.md)
###### [Manage antivirus in your business]()
####### [Management overview](windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md) ###### [Manage updates and apply baselines]()
####### [Use Group Policy settings to configure and manage antivirus](windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md) ####### [Learn about the different kinds of updates](windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md)
####### [Use Microsoft Endpoint Configuration Manager and Microsoft Intune to configure and manage antivirus](windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md) ####### [Manage protection and security intelligence updates](windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md)
####### [Use PowerShell cmdlets to configure and manage antivirus](windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md) ####### [Manage when protection updates should be downloaded and applied](windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md)
####### [Use Windows Management Instrumentation (WMI) to configure and manage antivirus](windows-defender-antivirus/use-wmi-windows-defender-antivirus.md) ####### [Manage updates for endpoints that are out of date](windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md)
####### [Use the mpcmdrun.exe commandline tool to configure and manage antivirus](windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md) ####### [Manage event-based forced updates](windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md)
####### [Manage updates for mobile devices and VMs](windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md)
###### [Manage scans and remediation]()
####### [Management overview](windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md) ##### [Customize, initiate, and review the results of scans and remediation]()
###### [Configuration overview](windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md)
####### [Configure and validate exclusions in antivirus scans]()
######## [Exclusions overview](windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md) ###### [Configure and validate exclusions in antivirus scans]()
######## [Configure and validate exclusions based on file name, extension, and folder location](windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md) ####### [Exclusions overview](windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md)
######## [Configure and validate exclusions for files opened by processes](windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md) ####### [Configure and validate exclusions based on file name, extension, and folder location](windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md)
######## [Configure antivirus exclusions on Windows Server 2016](windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md) ####### [Configure and validate exclusions for files opened by processes](windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md)
####### [Configure antivirus exclusions Windows Server 2016](windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md)
####### [Configure scanning options](windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md)
###### [Configure scanning antivirus options](windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md)
###### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md) ###### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md)
####### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md) ###### [Configure scheduled scans](windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md)
####### [Configure scheduled scans](windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md) ###### [Configure and run scans](windows-defender-antivirus/run-scan-windows-defender-antivirus.md)
####### [Configure and run scans](windows-defender-antivirus/run-scan-windows-defender-antivirus.md) ###### [Review scan results](windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md)
####### [Review scan results](windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md) ###### [Run and review the results of an offline scan](windows-defender-antivirus/windows-defender-offline.md)
####### [Run and review the results of an offline scan](windows-defender-antivirus/windows-defender-offline.md)
####### [Restore quarantined files](windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md)
###### [Manage next-generation protection in your business]()
####### [Handle false positives/negatives in Windows Defender Antivirus](windows-defender-antivirus/antivirus-false-positives-negatives.md)
####### [Management overview](windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md)
####### [Use Microsoft Intune and Microsoft Endpoint Configuration Manager to manage next generation protection](windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md)
####### [Use Group Policy settings to manage next generation protection](windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md)
####### [Use PowerShell cmdlets to manage next generation protection](windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md)
####### [Use Windows Management Instrumentation (WMI) to manage next generation protection](windows-defender-antivirus/use-wmi-windows-defender-antivirus.md)
####### [Use the mpcmdrun.exe command line tool to manage next generation protection](windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md)
##### [Microsoft Defender Advanced Threat Protection for Mac](microsoft-defender-atp/microsoft-defender-atp-mac.md)
###### [What's New](microsoft-defender-atp/mac-whatsnew.md)
###### [Deploy]()
####### [Microsoft Intune-based deployment](microsoft-defender-atp/mac-install-with-intune.md)
####### [JAMF-based deployment](microsoft-defender-atp/mac-install-with-jamf.md)
####### [Deployment with a different Mobile Device Management (MDM) system](microsoft-defender-atp/mac-install-with-other-mdm.md)
####### [Manual deployment](microsoft-defender-atp/mac-install-manually.md)
###### [Update](microsoft-defender-atp/mac-updates.md)
###### [Configure]()
####### [Configure and validate exclusions](microsoft-defender-atp/mac-exclusions.md)
####### [Set preferences](microsoft-defender-atp/mac-preferences.md)
####### [Detect and block Potentially Unwanted Applications](microsoft-defender-atp/mac-pua.md)
###### [Troubleshoot]()
####### [Troubleshoot performance issues](microsoft-defender-atp/mac-support-perf.md)
####### [Troubleshoot kernel extension issues](microsoft-defender-atp/mac-support-kext.md)
###### [Privacy](microsoft-defender-atp/mac-privacy.md)
###### [Resources](microsoft-defender-atp/mac-resources.md)
##### [Configure Secure score dashboard security controls](microsoft-defender-atp/secure-score-dashboard.md)
##### [Configure and manage Microsoft Threat Experts capabilities](microsoft-defender-atp/configure-microsoft-threat-experts.md)
#### [Configure portal settings]() ##### [Restore quarantined files](windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md)
##### [Set up preferences](microsoft-defender-atp/preferences-setup.md)
##### [General]() ##### [Manage antivirus in your business]()
###### [Update data retention settings](microsoft-defender-atp/data-retention-settings.md) ###### [Management overview](windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md)
###### [Configure alert notifications](microsoft-defender-atp/configure-email-notifications.md) ###### [Use Group Policy settings to configure and manage antivirus](windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md)
###### [Enable and create Power BI reports using Windows Defender Security center data](microsoft-defender-atp/powerbi-reports.md) ###### [Use Microsoft Endpoint Configuration Manager and Microsoft Intune to configure and manage antivirus](windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md)
###### [Enable Secure score security controls](microsoft-defender-atp/enable-secure-score.md) ###### [Use PowerShell cmdlets to configure and manage antivirus](windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md)
###### [Configure advanced features](microsoft-defender-atp/advanced-features.md) ###### [Use Windows Management Instrumentation (WMI) to configure and manage antivirus](windows-defender-antivirus/use-wmi-windows-defender-antivirus.md)
###### [Use the mpcmdrun.exe commandline tool to configure and manage antivirus](windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md)
##### [Permissions]()
###### [Use basic permissions to access the portal](microsoft-defender-atp/basic-permissions.md) ##### [Manage scans and remediation]()
###### [Manage portal access using RBAC](microsoft-defender-atp/rbac.md) ###### [Management overview](windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md)
####### [Create and manage roles](microsoft-defender-atp/user-roles.md)
####### [Create and manage machine groups](microsoft-defender-atp/machine-groups.md) ###### [Configure and validate exclusions in antivirus scans]()
######## [Create and manage machine tags](microsoft-defender-atp/machine-tags.md) ####### [Exclusions overview](windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md)
####### [Configure and validate exclusions based on file name, extension, and folder location](windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md)
##### [APIs]() ####### [Configure and validate exclusions for files opened by processes](windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md)
###### [Enable Threat intel (Deprecated)](microsoft-defender-atp/enable-custom-ti.md) ####### [Configure antivirus exclusions on Windows Server 2016](windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md)
###### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration.md)
###### [Configure scanning options](windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md)
##### [Rules]()
###### [Manage suppression rules](microsoft-defender-atp/manage-suppression-rules.md) ##### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md)
###### [Manage indicators](microsoft-defender-atp/manage-indicators.md) ###### [Configure remediation for scans](windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md)
###### [Manage automation file uploads](microsoft-defender-atp/manage-automation-file-uploads.md) ###### [Configure scheduled scans](windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md)
###### [Manage automation folder exclusions](microsoft-defender-atp/manage-automation-folder-exclusions.md) ###### [Configure and run scans](windows-defender-antivirus/run-scan-windows-defender-antivirus.md)
###### [Review scan results](windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md)
##### [Machine management]() ###### [Run and review the results of an offline scan](windows-defender-antivirus/windows-defender-offline.md)
###### [Onboarding machines](microsoft-defender-atp/onboard-configure.md) ###### [Restore quarantined files](windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md)
###### [Offboarding machines](microsoft-defender-atp/offboard-machines.md)
##### [Manage next-generation protection in your business]()
##### [Configure Microsoft Defender Security Center time zone settings](microsoft-defender-atp/time-settings.md) ###### [Handle false positives/negatives in Windows Defender Antivirus](windows-defender-antivirus/antivirus-false-positives-negatives.md)
###### [Management overview](windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md)
###### [Use Microsoft Intune and Microsoft Endpoint Configuration Manager to manage next generation protection](windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md)
###### [Use Group Policy settings to manage next generation protection](windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md)
###### [Use PowerShell cmdlets to manage next generation protection](windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md)
###### [Use Windows Management Instrumentation (WMI) to manage next generation protection](windows-defender-antivirus/use-wmi-windows-defender-antivirus.md)
###### [Use the mpcmdrun.exe command line tool to manage next generation protection](windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md)
#### [Microsoft Defender Advanced Threat Protection for Mac](microsoft-defender-atp/microsoft-defender-atp-mac.md)
##### [What's New](microsoft-defender-atp/mac-whatsnew.md)
##### [Deploy]()
###### [Microsoft Intune-based deployment](microsoft-defender-atp/mac-install-with-intune.md)
###### [JAMF-based deployment](microsoft-defender-atp/mac-install-with-jamf.md)
###### [Deployment with a different Mobile Device Management (MDM) system](microsoft-defender-atp/mac-install-with-other-mdm.md)
###### [Manual deployment](microsoft-defender-atp/mac-install-manually.md)
##### [Update](microsoft-defender-atp/mac-updates.md)
##### [Configure]()
###### [Configure and validate exclusions](microsoft-defender-atp/mac-exclusions.md)
###### [Set preferences](microsoft-defender-atp/mac-preferences.md)
###### [Detect and block Potentially Unwanted Applications](microsoft-defender-atp/mac-pua.md)
##### [Troubleshoot]()
###### [Troubleshoot performance issues](microsoft-defender-atp/mac-support-perf.md)
###### [Troubleshoot kernel extension issues](microsoft-defender-atp/mac-support-kext.md)
##### [Privacy](microsoft-defender-atp/mac-privacy.md)
##### [Resources](microsoft-defender-atp/mac-resources.md)
#### [Configure Secure score dashboard security controls](microsoft-defender-atp/secure-score-dashboard.md)
#### [Configure and manage Microsoft Threat Experts capabilities](microsoft-defender-atp/configure-microsoft-threat-experts.md)
### [Configure portal settings]()
#### [Set up preferences](microsoft-defender-atp/preferences-setup.md)
#### [General]()
##### [Update data retention settings](microsoft-defender-atp/data-retention-settings.md)
##### [Configure alert notifications](microsoft-defender-atp/configure-email-notifications.md)
##### [Enable and create Power BI reports using Windows Defender Security center data](microsoft-defender-atp/powerbi-reports.md)
##### [Enable Secure score security controls](microsoft-defender-atp/enable-secure-score.md)
##### [Configure advanced features](microsoft-defender-atp/advanced-features.md)
#### [Permissions]()
##### [Use basic permissions to access the portal](microsoft-defender-atp/basic-permissions.md)
##### [Manage portal access using RBAC](microsoft-defender-atp/rbac.md)
###### [Create and manage roles](microsoft-defender-atp/user-roles.md)
###### [Create and manage machine groups](microsoft-defender-atp/machine-groups.md)
####### [Create and manage machine tags](microsoft-defender-atp/machine-tags.md)
#### [APIs]()
##### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration.md)
#### [Rules]()
##### [Manage suppression rules](microsoft-defender-atp/manage-suppression-rules.md)
##### [Manage indicators](microsoft-defender-atp/manage-indicators.md)
##### [Manage automation file uploads](microsoft-defender-atp/manage-automation-file-uploads.md)
##### [Manage automation folder exclusions](microsoft-defender-atp/manage-automation-folder-exclusions.md)
#### [Machine management]()
##### [Onboarding machines](microsoft-defender-atp/onboard-configure.md)
##### [Offboarding machines](microsoft-defender-atp/offboard-machines.md)
#### [Configure Microsoft Defender Security Center time zone settings](microsoft-defender-atp/time-settings.md)

View File

@ -17,3 +17,42 @@ ms.topic: article
--- ---
# Configure capabilities # Configure capabilities
Deploying Microsoft Defender ATP is a three-phase process:
<br>
<table border="0" width="100%" align="center">
<tr style="text-align:center;">
<td align="center" style="width:25%; border:0;">
<a href= "windows/security/threat-protection/microsoft-defender-atp/prepare-deployment">
<img src="images/plan.png" alt="Plan to deploy Microsoft Defender ATP" title="Plan" />
<br/>Plan </a><br>
</td>
<td align="center">
<a href="windows/security/threat-protection/microsoft-defender-atp/production-deployment">
<img src="images/oboard.png" alt="Onboard to the Microsoft Defender ATP service" title="Onboard to Microsoft Defender ATP" />
<br/>Onboard </a><br>
</td>
<td align="center">
<a href="windows/security/threat-protection/microsoft-defender-atp/configure">
<img src="images/configure.png" alt="Configure capabilities" title="Configure capabilities" />
<br/>Configure </a><br>
</td>
</tr>
<tr>
<td style="width:25%; border:0;">
</td>
<td valign="top" style="width:25%; border:0;">
</td>
<td valign="top" style="width:25%; border:0;">
</td>
</tr>
</table>
You are currently in the configuration phase.
![Icons](images/configure-page.png)

View File

@ -42,9 +42,8 @@ There are three phases in deploying Microsoft Defender ATP:
</tr> </tr>
<tr> <tr>
<td style="width:25%; border:0;"> <td style="width:25%; border:0;">
The planning phase guides you through what you need to consider when deploying Microsoft Defender ATP. The planning phase guides you through what you need to consider when deploying Microsoft Defender ATP:
You will need to consider the following:
- Stakeholders and Sign-off - Stakeholders and Sign-off
- Environment considerations - Environment considerations
- Access - Access
@ -66,4 +65,6 @@ Maximize the Microsoft Defender ATP capabilities by configuring the components t
</tr> </tr>
</table> </table>
The deployment guide will walk you through the recommended path in deploying Microsoft Defender ATP.

View File

@ -17,11 +17,58 @@ ms.collection: M365-security-compliance
ms.topic: article ms.topic: article
--- ---
# Prepare Microsoft Defender ATP deployment # Plan Microsoft Defender ATP deployment
**Applies to:** **Applies to:**
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
Deploying Microsoft Defender ATP is a three-phase process:
<br>
<table border="0" width="100%" align="center">
<tr style="text-align:center;">
<td align="center" style="width:25%; border:0;">
<a href= "windows/security/threat-protection/microsoft-defender-atp/prepare-deployment">
<img src="images/plan.png" alt="Plan to deploy Microsoft Defender ATP" title="Plan" />
<br/>Plan </a><br>
</td>
<td align="center">
<a href="windows/security/threat-protection/microsoft-defender-atp/production-deployment">
<img src="images/oboard.png" alt="Onboard to the Microsoft Defender ATP service" title="Onboard to Microsoft Defender ATP" />
<br/>Onboard </a><br>
</td>
<td align="center">
<a href="windows/security/threat-protection/microsoft-defender-atp/configure">
<img src="images/configure.png" alt="Configure capabilities" title="Configure capabilities" />
<br/>Configure </a><br>
</td>
</tr>
<tr>
<td style="width:25%; border:0;">
</td>
<td valign="top" style="width:25%; border:0;">
</td>
<td valign="top" style="width:25%; border:0;">
</td>
</tr>
</table>
You are currently in the planning phase.
![Icons](images/plan-page.png)
## Stakeholders and Sign-off ## Stakeholders and Sign-off
The following section serves to identify all the stakeholders that are involved The following section serves to identify all the stakeholders that are involved
in this project and need to sign-off, review, or stay informed. Add stakeholders in this project and need to sign-off, review, or stay informed. Add stakeholders

View File

@ -22,6 +22,47 @@ ms.topic: article
**Applies to:** **Applies to:**
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
Deploying Microsoft Defender ATP is a three-phase process:
<br>
<table border="0" width="100%" align="center">
<tr style="text-align:center;">
<td align="center" style="width:25%; border:0;">
<a href= "windows/security/threat-protection/microsoft-defender-atp/prepare-deployment">
<img src="images/plan.png" alt="Plan to deploy Microsoft Defender ATP" title="Plan" />
<br/>Plan </a><br>
</td>
<td align="center">
<a href="windows/security/threat-protection/microsoft-defender-atp/production-deployment">
<img src="images/oboard.png" alt="Onboard to the Microsoft Defender ATP service" title="Onboard to Microsoft Defender ATP" />
<br/>Onboard </a><br>
</td>
<td align="center">
<a href="windows/security/threat-protection/microsoft-defender-atp/configure">
<img src="images/configure.png" alt="Configure capabilities" title="Configure capabilities" />
<br/>Configure </a><br>
</td>
</tr>
<tr>
<td style="width:25%; border:0;">
</td>
<td valign="top" style="width:25%; border:0;">
</td>
<td valign="top" style="width:25%; border:0;">
</td>
</tr>
</table>
You are currently in the onboard phase
![Icons](images/onboard-page.png)
Proper planning is the foundation of a successful deployment. In this deployment scenario, you'll be guided through the steps on: Proper planning is the foundation of a successful deployment. In this deployment scenario, you'll be guided through the steps on:
- Tenant configuration - Tenant configuration
- Network configuration - Network configuration